Analysis
-
max time kernel
46s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12-04-2023 14:07
Static task
static1
Behavioral task
behavioral1
Sample
e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe
Resource
win10v2004-20230220-en
General
-
Target
e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe
-
Size
5.0MB
-
MD5
8b1f945c3be65f087ce41188397403be
-
SHA1
aa9bc2cf10e61c12b5ab418179e0d2ec40c0202c
-
SHA256
e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9
-
SHA512
ee743eb12a28dc67b4bd1be96549d6cfca2dfc640d3f55606cbf83f07196ef64fac017f2889acf2ca0120ea1814737dbce2b911c45bc40ba5d3c1345a132b871
-
SSDEEP
98304:rdByjbXu9v/svNFhkPxy3WYyS3T9Fsx7P7qPjlEBq0:Cf+BUvNrkP5YFj9FjPkq
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1156-133-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 16 IoCs
resource yara_rule behavioral1/memory/460-149-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-152-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-155-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-156-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-159-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-162-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-163-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-164-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-165-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-166-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-167-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-168-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-169-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-170-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-171-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-172-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url InstallUtil.exe -
Executes dropped EXE 2 IoCs
pid Process 460 Driver.exe 5060 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\InstallUtil.exe" InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1932 set thread context of 1156 1932 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 4472 460 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe 1156 InstallUtil.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1156 InstallUtil.exe Token: SeLockMemoryPrivilege 460 Driver.exe Token: SeLockMemoryPrivilege 460 Driver.exe Token: SeLockMemoryPrivilege 5060 Driver.exe Token: SeLockMemoryPrivilege 5060 Driver.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1156 1932 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 83 PID 1932 wrote to memory of 1156 1932 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 83 PID 1932 wrote to memory of 1156 1932 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 83 PID 1932 wrote to memory of 1156 1932 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 83 PID 1932 wrote to memory of 1156 1932 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 83 PID 1932 wrote to memory of 1156 1932 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 83 PID 1932 wrote to memory of 1156 1932 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 83 PID 1932 wrote to memory of 1156 1932 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 83 PID 1156 wrote to memory of 460 1156 InstallUtil.exe 88 PID 1156 wrote to memory of 460 1156 InstallUtil.exe 88 PID 1156 wrote to memory of 5060 1156 InstallUtil.exe 94 PID 1156 wrote to memory of 5060 1156 InstallUtil.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe"C:\Users\Admin\AppData\Local\Temp\e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 43vDzCah59pa7NjPUPS2ow6tp1drE7MUU188sTbUJ1wzNyfnvRyDdtic8C4kPMambW1PcRMbkBgvbM157NBNjs3tRWxYy83 -p x -k -v=0 --donate-level=0 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:460 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 460 -s 7604⤵
- Program crash
PID:4472
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 43vDzCah59pa7NjPUPS2ow6tp1drE7MUU188sTbUJ1wzNyfnvRyDdtic8C4kPMambW1PcRMbkBgvbM157NBNjs3tRWxYy83 -p x -k -v=0 --donate-level=0 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 460 -ip 4601⤵PID:1612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322