Analysis

  • max time kernel
    32s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13-05-2023 20:34

General

  • Target

    61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29.exe

  • Size

    6.2MB

  • MD5

    a193434018c93b4c84767c80f73f2253

  • SHA1

    77b9de6465dbe9ec0435b44c8c7505471a9bb01d

  • SHA256

    61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29

  • SHA512

    0fa49721e806395c44c2ea1ab17425f45c1cc75b02e4a5b9ffe6e392a4410a868b7d755b260c2952d75046a2ea7753a3de667ecf7d0f07e420e94214a9c3cfee

  • SSDEEP

    98304:HWP0e39YV6AbdmorKY6Q5o8UGRt665KpP2+M9QfT7KycGiLlVJqFosrN9nrUTLi:HWP0QS9dMe5TBSyKQ+7fKtVPsrN9oS

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 6 IoCs
  • XMRig Miner payload 11 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29.exe
    "C:\Users\Admin\AppData\Local\Temp\61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\Usermode.exe
      "C:\Users\Admin\AppData\Local\Temp\Usermode.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
        "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 86VwoTuZTDgF5trS4bcEkvXtoHhUySbTWaWD5K4chXXc6XEPtWSVJcB43EVa9fmhPwcXRDNJ1hY21QqQtH3MQShV1F4VWrX -p x -k -v=0 --donate-level=1 -t 2
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:536
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Users\Admin\AppData\Local\Temp\is-JVV3C.tmp\setup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-JVV3C.tmp\setup.tmp" /SL5="$9011E,2411950,352768,C:\Users\Admin\AppData\Local\Temp\setup.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1680
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c ping -n 3 127.0.0.1 & copy /Y "C:\Users\Admin\AppData\Local\Temp\setup.exe" "C:\Users\Admin\AppData\Local\Temp\61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29.exe" >> NUL
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 3 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Usermode.exe

    Filesize

    4.7MB

    MD5

    c08501fa8eca8770f56a14bee65ca31a

    SHA1

    1631125fef2594684dceed63455c7816c5ce1e46

    SHA256

    226494ab0effda8f789283a4b1a4b04d719b896d6315684c3b5b7262b8906385

    SHA512

    5021a7123f502ae62128e02c65def41c7f375c5abca9334719e66938b7b80d3449f2aba08b3050fb9da7972f1ab3ae6f499f0a6ba1f46f515487047d54315025

  • C:\Users\Admin\AppData\Local\Temp\Usermode.exe

    Filesize

    4.7MB

    MD5

    c08501fa8eca8770f56a14bee65ca31a

    SHA1

    1631125fef2594684dceed63455c7816c5ce1e46

    SHA256

    226494ab0effda8f789283a4b1a4b04d719b896d6315684c3b5b7262b8906385

    SHA512

    5021a7123f502ae62128e02c65def41c7f375c5abca9334719e66938b7b80d3449f2aba08b3050fb9da7972f1ab3ae6f499f0a6ba1f46f515487047d54315025

  • C:\Users\Admin\AppData\Local\Temp\Usermode.exe

    Filesize

    4.7MB

    MD5

    c08501fa8eca8770f56a14bee65ca31a

    SHA1

    1631125fef2594684dceed63455c7816c5ce1e46

    SHA256

    226494ab0effda8f789283a4b1a4b04d719b896d6315684c3b5b7262b8906385

    SHA512

    5021a7123f502ae62128e02c65def41c7f375c5abca9334719e66938b7b80d3449f2aba08b3050fb9da7972f1ab3ae6f499f0a6ba1f46f515487047d54315025

  • C:\Users\Admin\AppData\Local\Temp\is-JVV3C.tmp\setup.tmp

    Filesize

    1.6MB

    MD5

    36da68f5c3a7fe4dd3f589941160ac85

    SHA1

    71c610db1bc62c9af3d23f819433a6cd89432fe8

    SHA256

    95883809e3356924097775a13407a43bcf48aca640b7d795ea2ef4e2d261285e

    SHA512

    56c3431cab652fda44c4a102f8d16ccd7b9f96aebdb1a63bfc9c6f5e0dec99607562574f40e5e7a8666d8d5f76b6b4d8e8baef1b0629f1f64cf32786f8fb146c

  • C:\Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    2.9MB

    MD5

    df0fd86748ba867a58e017bb2311990f

    SHA1

    d3a4f8e7ff824d6c8dfcd4c6be6f6435ffd1337e

    SHA256

    716e232390346c61dd7fc36cf381a5355ff825142b3ed5d70901cd1d4dd305f4

    SHA512

    097136bb69d2251de255a36aa5115ed1f27d3283110f56b41ebc0ac1783982ffa76ece756cb03e60a3b5f0dcb42d7899b8f7a3e1398fe1c7a09a3d2a491bb6eb

  • C:\Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    2.9MB

    MD5

    df0fd86748ba867a58e017bb2311990f

    SHA1

    d3a4f8e7ff824d6c8dfcd4c6be6f6435ffd1337e

    SHA256

    716e232390346c61dd7fc36cf381a5355ff825142b3ed5d70901cd1d4dd305f4

    SHA512

    097136bb69d2251de255a36aa5115ed1f27d3283110f56b41ebc0ac1783982ffa76ece756cb03e60a3b5f0dcb42d7899b8f7a3e1398fe1c7a09a3d2a491bb6eb

  • C:\Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    2.9MB

    MD5

    df0fd86748ba867a58e017bb2311990f

    SHA1

    d3a4f8e7ff824d6c8dfcd4c6be6f6435ffd1337e

    SHA256

    716e232390346c61dd7fc36cf381a5355ff825142b3ed5d70901cd1d4dd305f4

    SHA512

    097136bb69d2251de255a36aa5115ed1f27d3283110f56b41ebc0ac1783982ffa76ece756cb03e60a3b5f0dcb42d7899b8f7a3e1398fe1c7a09a3d2a491bb6eb

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    4.6MB

    MD5

    22b86c4bdd3a476351ebe051e2af9564

    SHA1

    10c9928d20a1e272f58fef1a56434deabae68aa4

    SHA256

    fd37e08f7e809d14f9e73f802ac0a35c6cea8bfb1261504cafc660d306c21c45

    SHA512

    fd7e047096015472705e8127f66faa50d71f0e527a4d5b708a16f02289778c18ecd7715f35a37cdaa88a8a9c2786b369b0e23e4009be4f93a79ca0675f2ed982

  • \Users\Admin\AppData\Local\Temp\Usermode.exe

    Filesize

    4.7MB

    MD5

    c08501fa8eca8770f56a14bee65ca31a

    SHA1

    1631125fef2594684dceed63455c7816c5ce1e46

    SHA256

    226494ab0effda8f789283a4b1a4b04d719b896d6315684c3b5b7262b8906385

    SHA512

    5021a7123f502ae62128e02c65def41c7f375c5abca9334719e66938b7b80d3449f2aba08b3050fb9da7972f1ab3ae6f499f0a6ba1f46f515487047d54315025

  • \Users\Admin\AppData\Local\Temp\is-DKGG1.tmp\ISDone.dll

    Filesize

    452KB

    MD5

    f26684a0b0999413be6751f335603471

    SHA1

    dcd054328740c4bbf00e11b0b8f00a00f311898d

    SHA256

    44e56185af5aae005e0298397e75ba0792a9cbb61341ddf07635536c62630890

    SHA512

    d1358b7142ca466a3ad17f09cdc283546aad9ebc454abf06f7673d46e4c5c59280d0bc673b4bdc557e3032d27aa261667de4284e9fc7d46aba64f89da807df3e

  • \Users\Admin\AppData\Local\Temp\is-DKGG1.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-DKGG1.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-DKGG1.tmp\b2p.dll

    Filesize

    22KB

    MD5

    ab35386487b343e3e82dbd2671ff9dab

    SHA1

    03591d07aea3309b631a7d3a6e20a92653e199b8

    SHA256

    c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2

    SHA512

    b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09

  • \Users\Admin\AppData\Local\Temp\is-DKGG1.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • \Users\Admin\AppData\Local\Temp\is-JVV3C.tmp\setup.tmp

    Filesize

    1.6MB

    MD5

    36da68f5c3a7fe4dd3f589941160ac85

    SHA1

    71c610db1bc62c9af3d23f819433a6cd89432fe8

    SHA256

    95883809e3356924097775a13407a43bcf48aca640b7d795ea2ef4e2d261285e

    SHA512

    56c3431cab652fda44c4a102f8d16ccd7b9f96aebdb1a63bfc9c6f5e0dec99607562574f40e5e7a8666d8d5f76b6b4d8e8baef1b0629f1f64cf32786f8fb146c

  • \Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    2.9MB

    MD5

    df0fd86748ba867a58e017bb2311990f

    SHA1

    d3a4f8e7ff824d6c8dfcd4c6be6f6435ffd1337e

    SHA256

    716e232390346c61dd7fc36cf381a5355ff825142b3ed5d70901cd1d4dd305f4

    SHA512

    097136bb69d2251de255a36aa5115ed1f27d3283110f56b41ebc0ac1783982ffa76ece756cb03e60a3b5f0dcb42d7899b8f7a3e1398fe1c7a09a3d2a491bb6eb

  • \Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    4.6MB

    MD5

    22b86c4bdd3a476351ebe051e2af9564

    SHA1

    10c9928d20a1e272f58fef1a56434deabae68aa4

    SHA256

    fd37e08f7e809d14f9e73f802ac0a35c6cea8bfb1261504cafc660d306c21c45

    SHA512

    fd7e047096015472705e8127f66faa50d71f0e527a4d5b708a16f02289778c18ecd7715f35a37cdaa88a8a9c2786b369b0e23e4009be4f93a79ca0675f2ed982

  • memory/268-71-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/268-113-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/536-110-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/536-120-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/536-175-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/536-169-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/536-163-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/536-157-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/536-150-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/536-144-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/536-138-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/536-102-0x00000000003F0000-0x0000000000400000-memory.dmp

    Filesize

    64KB

  • memory/536-133-0x0000000000480000-0x00000000004A0000-memory.dmp

    Filesize

    128KB

  • memory/536-131-0x0000000000460000-0x0000000000480000-memory.dmp

    Filesize

    128KB

  • memory/536-130-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/536-129-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/536-118-0x0000000000460000-0x0000000000480000-memory.dmp

    Filesize

    128KB

  • memory/536-119-0x0000000000480000-0x00000000004A0000-memory.dmp

    Filesize

    128KB

  • memory/1680-112-0x0000000073CB0000-0x0000000073CC1000-memory.dmp

    Filesize

    68KB

  • memory/1680-111-0x0000000002170000-0x0000000002172000-memory.dmp

    Filesize

    8KB

  • memory/1680-107-0x00000000030E0000-0x00000000030EF000-memory.dmp

    Filesize

    60KB

  • memory/1680-90-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/1680-117-0x00000000030E0000-0x00000000030EF000-memory.dmp

    Filesize

    60KB

  • memory/1680-116-0x0000000073CB0000-0x0000000073CC1000-memory.dmp

    Filesize

    68KB

  • memory/1680-115-0x0000000002E00000-0x0000000002E77000-memory.dmp

    Filesize

    476KB

  • memory/1680-114-0x0000000000400000-0x00000000005AC000-memory.dmp

    Filesize

    1.7MB

  • memory/1680-159-0x0000000000400000-0x00000000005AC000-memory.dmp

    Filesize

    1.7MB

  • memory/1680-122-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/1680-88-0x0000000002E00000-0x0000000002E77000-memory.dmp

    Filesize

    476KB

  • memory/1680-152-0x0000000003240000-0x0000000003241000-memory.dmp

    Filesize

    4KB

  • memory/1680-153-0x0000000000400000-0x00000000005AC000-memory.dmp

    Filesize

    1.7MB

  • memory/1700-108-0x00000000063B0000-0x000000000708E000-memory.dmp

    Filesize

    12.9MB

  • memory/1700-70-0x0000000000BA0000-0x0000000001050000-memory.dmp

    Filesize

    4.7MB

  • memory/1700-128-0x00000000063B0000-0x000000000708E000-memory.dmp

    Filesize

    12.9MB

  • memory/1700-127-0x0000000004C60000-0x0000000004CA0000-memory.dmp

    Filesize

    256KB

  • memory/1700-103-0x0000000004C60000-0x0000000004CA0000-memory.dmp

    Filesize

    256KB