Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-04-2023 16:09

General

  • Target

    f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe

  • Size

    5.0MB

  • MD5

    8f36b3fba4e5d51d40026e16fbc7742e

  • SHA1

    00162dcf53957e496540b1c3fbc0ca2b02e7620b

  • SHA256

    f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605

  • SHA512

    2e67daea2946e8de5bb2fb9b91fac886569f4f9aeb9e39798c95466a326498bd41da9c09ba9cfe7f367f604eb51bc3f6b27becccf2b533d1d9e0318de6ba6be5

  • SSDEEP

    98304:CKTqoFhD35ATaYuL27df4TGBEGRWmybmIyvCFXQn1fzO+W:CmgaYuL27ReGBEGRWFbivcQ1Lw

Malware Config

Extracted

Family

loaderbot

C2

http://gerag2pe.beget.tech/cmd.php

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 1 IoCs
  • XMRig Miner payload 18 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe
    "C:\Users\Admin\AppData\Local\Temp\f4e4abc185d26f1bbb6f7c50245aace36bccf338a2f4e77ce358b36872079605.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
        PID:740
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
          PID:4388
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          2⤵
          • Drops startup file
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4924
          • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
            "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 43vDzCah59pa7NjPUPS2ow6tp1drE7MUU188sTbUJ1wzNyfnvRyDdtic8C4kPMambW1PcRMbkBgvbM157NBNjs3tRWxYy83 -p x -k -v=0 --donate-level=0 -t 2
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1736
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 1736 -s 764
              4⤵
              • Program crash
              PID:852
          • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
            "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 43vDzCah59pa7NjPUPS2ow6tp1drE7MUU188sTbUJ1wzNyfnvRyDdtic8C4kPMambW1PcRMbkBgvbM157NBNjs3tRWxYy83 -p x -k -v=0 --donate-level=0 -t 2
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1224
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 1224 -s 852
              4⤵
              • Program crash
              PID:5024
          • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
            "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 43vDzCah59pa7NjPUPS2ow6tp1drE7MUU188sTbUJ1wzNyfnvRyDdtic8C4kPMambW1PcRMbkBgvbM157NBNjs3tRWxYy83 -p x -k -v=0 --donate-level=0 -t 2
            3⤵
            • Executes dropped EXE
            PID:4720
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 4720 -s 556
              4⤵
              • Program crash
              PID:3620
          • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
            "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 43vDzCah59pa7NjPUPS2ow6tp1drE7MUU188sTbUJ1wzNyfnvRyDdtic8C4kPMambW1PcRMbkBgvbM157NBNjs3tRWxYy83 -p x -k -v=0 --donate-level=0 -t 2
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4664
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 468 -p 1736 -ip 1736
        1⤵
          PID:2840
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 184 -p 1224 -ip 1224
          1⤵
            PID:2152
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -pss -s 524 -p 4720 -ip 4720
            1⤵
              PID:3608

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • memory/1224-161-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-164-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-176-0x0000000000470000-0x0000000000490000-memory.dmp

              Filesize

              128KB

            • memory/1224-175-0x0000000000450000-0x0000000000470000-memory.dmp

              Filesize

              128KB

            • memory/1224-153-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-174-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-155-0x0000000000420000-0x0000000000440000-memory.dmp

              Filesize

              128KB

            • memory/1224-156-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-157-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-158-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-159-0x0000000000450000-0x0000000000470000-memory.dmp

              Filesize

              128KB

            • memory/1224-160-0x0000000000470000-0x0000000000490000-memory.dmp

              Filesize

              128KB

            • memory/1224-173-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-162-0x0000000000450000-0x0000000000470000-memory.dmp

              Filesize

              128KB

            • memory/1224-163-0x0000000000470000-0x0000000000490000-memory.dmp

              Filesize

              128KB

            • memory/1224-172-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-165-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-166-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-167-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-168-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-169-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-170-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1224-171-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1736-149-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1736-148-0x00000000004D0000-0x00000000004E4000-memory.dmp

              Filesize

              80KB

            • memory/1736-150-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/4720-179-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/4720-180-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/4924-133-0x0000000000400000-0x00000000007FE000-memory.dmp

              Filesize

              4.0MB

            • memory/4924-154-0x0000000005210000-0x0000000005220000-memory.dmp

              Filesize

              64KB

            • memory/4924-137-0x0000000005580000-0x00000000055E6000-memory.dmp

              Filesize

              408KB

            • memory/4924-135-0x0000000005210000-0x0000000005220000-memory.dmp

              Filesize

              64KB