Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
12-04-2023 16:09
Static task
static1
Behavioral task
behavioral1
Sample
f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe
Resource
win10-20230220-en
General
-
Target
f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe
-
Size
5.0MB
-
MD5
8f36b3fba4e5d51d40026e16fbc7742e
-
SHA1
00162dcf53957e496540b1c3fbc0ca2b02e7620b
-
SHA256
f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605
-
SHA512
2e67daea2946e8de5bb2fb9b91fac886569f4f9aeb9e39798c95466a326498bd41da9c09ba9cfe7f367f604eb51bc3f6b27becccf2b533d1d9e0318de6ba6be5
-
SSDEEP
98304:CKTqoFhD35ATaYuL27df4TGBEGRWmybmIyvCFXQn1fzO+W:CmgaYuL27ReGBEGRWFbivcQ1Lw
Malware Config
Extracted
loaderbot
http://gerag2pe.beget.tech/cmd.php
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/4612-119-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 15 IoCs
resource yara_rule behavioral1/memory/1704-129-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-131-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-132-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-135-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-138-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-139-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-140-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-141-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-142-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-143-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-144-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-145-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-146-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-147-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-148-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url InstallUtil.exe -
Executes dropped EXE 1 IoCs
pid Process 1704 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\InstallUtil.exe" InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4264 set thread context of 4612 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 68 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe 4612 InstallUtil.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 620 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4612 InstallUtil.exe Token: SeLockMemoryPrivilege 1704 Driver.exe Token: SeLockMemoryPrivilege 1704 Driver.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4264 wrote to memory of 4304 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 67 PID 4264 wrote to memory of 4304 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 67 PID 4264 wrote to memory of 4304 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 67 PID 4264 wrote to memory of 4304 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 67 PID 4264 wrote to memory of 4612 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 68 PID 4264 wrote to memory of 4612 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 68 PID 4264 wrote to memory of 4612 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 68 PID 4264 wrote to memory of 4612 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 68 PID 4264 wrote to memory of 4612 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 68 PID 4264 wrote to memory of 4612 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 68 PID 4264 wrote to memory of 4612 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 68 PID 4264 wrote to memory of 4612 4264 f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe 68 PID 4612 wrote to memory of 1704 4612 InstallUtil.exe 70 PID 4612 wrote to memory of 1704 4612 InstallUtil.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe"C:\Users\Admin\AppData\Local\Temp\f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:4304
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 43vDzCah59pa7NjPUPS2ow6tp1drE7MUU188sTbUJ1wzNyfnvRyDdtic8C4kPMambW1PcRMbkBgvbM157NBNjs3tRWxYy83 -p x -k -v=0 --donate-level=0 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322