Analysis
-
max time kernel
72s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
12-04-2023 14:07
Static task
static1
Behavioral task
behavioral1
Sample
e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe
Resource
win10-20230220-en
General
-
Target
e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe
-
Size
5.0MB
-
MD5
8b1f945c3be65f087ce41188397403be
-
SHA1
aa9bc2cf10e61c12b5ab418179e0d2ec40c0202c
-
SHA256
e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9
-
SHA512
ee743eb12a28dc67b4bd1be96549d6cfca2dfc640d3f55606cbf83f07196ef64fac017f2889acf2ca0120ea1814737dbce2b911c45bc40ba5d3c1345a132b871
-
SSDEEP
98304:rdByjbXu9v/svNFhkPxy3WYyS3T9Fsx7P7qPjlEBq0:Cf+BUvNrkP5YFj9FjPkq
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/2316-121-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 15 IoCs
resource yara_rule behavioral1/memory/4584-131-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-133-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-134-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-135-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-138-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-141-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-142-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-143-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-144-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-145-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-146-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-147-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-148-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-149-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4584-150-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url InstallUtil.exe -
Executes dropped EXE 1 IoCs
pid Process 4584 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\InstallUtil.exe" InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 2316 2032 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 67 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 640 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2316 InstallUtil.exe Token: SeLockMemoryPrivilege 4584 Driver.exe Token: SeLockMemoryPrivilege 4584 Driver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2316 2032 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 67 PID 2032 wrote to memory of 2316 2032 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 67 PID 2032 wrote to memory of 2316 2032 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 67 PID 2032 wrote to memory of 2316 2032 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 67 PID 2032 wrote to memory of 2316 2032 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 67 PID 2032 wrote to memory of 2316 2032 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 67 PID 2032 wrote to memory of 2316 2032 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 67 PID 2032 wrote to memory of 2316 2032 e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe 67 PID 2316 wrote to memory of 4584 2316 InstallUtil.exe 70 PID 2316 wrote to memory of 4584 2316 InstallUtil.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe"C:\Users\Admin\AppData\Local\Temp\e82ddd25a062bc207cc82773a9c8f902be0e3343a7a644d95de765d74ff60ab9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 43vDzCah59pa7NjPUPS2ow6tp1drE7MUU188sTbUJ1wzNyfnvRyDdtic8C4kPMambW1PcRMbkBgvbM157NBNjs3tRWxYy83 -p x -k -v=0 --donate-level=0 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322