Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2023 17:29
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
2.7MB
-
MD5
bd83b22d90836c81047b081dcbacb63d
-
SHA1
ce52554f5bbd0e26332309166a2912609797f8b6
-
SHA256
5bc457579941e276a1ad34f285a12d4a40febb92cafd37ac0ab8c476c240912a
-
SHA512
8025ca796c9273fe5e6fb3e1e1481d63bce796462ebae24857d8aae01bc74c9634bdb509c4f57f23c0523005f89f8eb78f827e34a65cce8502c994494aa5b1c0
-
SSDEEP
49152:TFS3NYgv3IsJks7JFsaaq7VZbAMS9IeD/P/sXZYkZ4jh+:TYbv3Isms1kq7DMFNTkqkZQh+
Malware Config
Extracted
loaderbot
https://sh4453464.c.had.su/cmd.php
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/1708-144-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 14 IoCs
resource yara_rule behavioral2/memory/1572-162-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2992-166-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2992-169-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2992-170-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2992-173-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2992-176-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2992-177-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2992-178-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2992-179-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2992-180-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2992-181-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2992-182-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1872-187-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1872-188-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation file.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url file.exe -
Executes dropped EXE 3 IoCs
pid Process 1572 Driver.exe 2992 Driver.exe 1872 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\file.exe" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1596 set thread context of 1708 1596 file.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5052 1572 WerFault.exe 93 2192 2992 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1596 file.exe 1596 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe 1708 file.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 672 Process not Found 672 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1708 file.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1596 file.exe Token: SeDebugPrivilege 1708 file.exe Token: SeLockMemoryPrivilege 1572 Driver.exe Token: SeLockMemoryPrivilege 1572 Driver.exe Token: SeLockMemoryPrivilege 2992 Driver.exe Token: SeLockMemoryPrivilege 2992 Driver.exe Token: SeLockMemoryPrivilege 1872 Driver.exe Token: SeLockMemoryPrivilege 1872 Driver.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1596 wrote to memory of 1440 1596 file.exe 90 PID 1596 wrote to memory of 1440 1596 file.exe 90 PID 1596 wrote to memory of 1440 1596 file.exe 90 PID 1596 wrote to memory of 1708 1596 file.exe 91 PID 1596 wrote to memory of 1708 1596 file.exe 91 PID 1596 wrote to memory of 1708 1596 file.exe 91 PID 1596 wrote to memory of 1708 1596 file.exe 91 PID 1596 wrote to memory of 1708 1596 file.exe 91 PID 1596 wrote to memory of 1708 1596 file.exe 91 PID 1596 wrote to memory of 1708 1596 file.exe 91 PID 1596 wrote to memory of 1708 1596 file.exe 91 PID 1708 wrote to memory of 1572 1708 file.exe 93 PID 1708 wrote to memory of 1572 1708 file.exe 93 PID 1708 wrote to memory of 2992 1708 file.exe 98 PID 1708 wrote to memory of 2992 1708 file.exe 98 PID 1708 wrote to memory of 1872 1708 file.exe 104 PID 1708 wrote to memory of 1872 1708 file.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\file.exe"{path}"2⤵PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"{path}"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4935xbCqwWU1Kskmfu796NjQVuLDZAR4xdvf7fe2p9w3XVkqbRHPR5ELemPeGJJhVWGxjeLuvZqf8ZVFPabUB5CTNSBG2RV -p x -k -v=0 --donate-level=1 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1572 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1572 -s 7604⤵
- Program crash
PID:5052
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4935xbCqwWU1Kskmfu796NjQVuLDZAR4xdvf7fe2p9w3XVkqbRHPR5ELemPeGJJhVWGxjeLuvZqf8ZVFPabUB5CTNSBG2RV -p x -k -v=0 --donate-level=1 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2992 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2992 -s 5484⤵
- Program crash
PID:2192
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4935xbCqwWU1Kskmfu796NjQVuLDZAR4xdvf7fe2p9w3XVkqbRHPR5ELemPeGJJhVWGxjeLuvZqf8ZVFPabUB5CTNSBG2RV -p x -k -v=0 --donate-level=1 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 432 -p 1572 -ip 15721⤵PID:888
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 536 -p 2992 -ip 29921⤵PID:1488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53ae5fa36d6c5cf135fb14702c5777bc0
SHA186a5aa45d96748084ace87493debdf3d329cd521
SHA2561f05b6335396291c2e7a378aa96b741374541807a1dbd94b74025f43984e917c
SHA5127fe99728c09b6d832b9b06c60a962437ffc7f6175efe047b2a1c1f830b01469558055e3a032aa8c92e9e026f07efcc02e00236f9b9e02461908bcfce9272daa3
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322