Analysis

  • max time kernel
    57s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2023 20:34

General

  • Target

    61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29.exe

  • Size

    6.2MB

  • MD5

    a193434018c93b4c84767c80f73f2253

  • SHA1

    77b9de6465dbe9ec0435b44c8c7505471a9bb01d

  • SHA256

    61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29

  • SHA512

    0fa49721e806395c44c2ea1ab17425f45c1cc75b02e4a5b9ffe6e392a4410a868b7d755b260c2952d75046a2ea7753a3de667ecf7d0f07e420e94214a9c3cfee

  • SSDEEP

    98304:HWP0e39YV6AbdmorKY6Q5o8UGRt665KpP2+M9QfT7KycGiLlVJqFosrN9nrUTLi:HWP0QS9dMe5TBSyKQ+7fKtVPsrN9oS

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 4 IoCs
  • XMRig Miner payload 9 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29.exe
    "C:\Users\Admin\AppData\Local\Temp\61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\Usermode.exe
      "C:\Users\Admin\AppData\Local\Temp\Usermode.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
        "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 86VwoTuZTDgF5trS4bcEkvXtoHhUySbTWaWD5K4chXXc6XEPtWSVJcB43EVa9fmhPwcXRDNJ1hY21QqQtH3MQShV1F4VWrX -p x -k -v=0 --donate-level=1 -t 2
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:5100
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:792
      • C:\Users\Admin\AppData\Local\Temp\is-M818I.tmp\setup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-M818I.tmp\setup.tmp" /SL5="$E01D2,2411950,352768,C:\Users\Admin\AppData\Local\Temp\setup.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:632
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c ping -n 3 127.0.0.1 & copy /Y "C:\Users\Admin\AppData\Local\Temp\setup.exe" "C:\Users\Admin\AppData\Local\Temp\61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29.exe" >> NUL
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4612
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 3 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:5112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Usermode.exe

    Filesize

    4.7MB

    MD5

    c08501fa8eca8770f56a14bee65ca31a

    SHA1

    1631125fef2594684dceed63455c7816c5ce1e46

    SHA256

    226494ab0effda8f789283a4b1a4b04d719b896d6315684c3b5b7262b8906385

    SHA512

    5021a7123f502ae62128e02c65def41c7f375c5abca9334719e66938b7b80d3449f2aba08b3050fb9da7972f1ab3ae6f499f0a6ba1f46f515487047d54315025

  • C:\Users\Admin\AppData\Local\Temp\Usermode.exe

    Filesize

    4.7MB

    MD5

    c08501fa8eca8770f56a14bee65ca31a

    SHA1

    1631125fef2594684dceed63455c7816c5ce1e46

    SHA256

    226494ab0effda8f789283a4b1a4b04d719b896d6315684c3b5b7262b8906385

    SHA512

    5021a7123f502ae62128e02c65def41c7f375c5abca9334719e66938b7b80d3449f2aba08b3050fb9da7972f1ab3ae6f499f0a6ba1f46f515487047d54315025

  • C:\Users\Admin\AppData\Local\Temp\Usermode.exe

    Filesize

    4.7MB

    MD5

    c08501fa8eca8770f56a14bee65ca31a

    SHA1

    1631125fef2594684dceed63455c7816c5ce1e46

    SHA256

    226494ab0effda8f789283a4b1a4b04d719b896d6315684c3b5b7262b8906385

    SHA512

    5021a7123f502ae62128e02c65def41c7f375c5abca9334719e66938b7b80d3449f2aba08b3050fb9da7972f1ab3ae6f499f0a6ba1f46f515487047d54315025

  • C:\Users\Admin\AppData\Local\Temp\is-KBCSE.tmp\ISDone.dll

    Filesize

    452KB

    MD5

    f26684a0b0999413be6751f335603471

    SHA1

    dcd054328740c4bbf00e11b0b8f00a00f311898d

    SHA256

    44e56185af5aae005e0298397e75ba0792a9cbb61341ddf07635536c62630890

    SHA512

    d1358b7142ca466a3ad17f09cdc283546aad9ebc454abf06f7673d46e4c5c59280d0bc673b4bdc557e3032d27aa261667de4284e9fc7d46aba64f89da807df3e

  • C:\Users\Admin\AppData\Local\Temp\is-KBCSE.tmp\ISDone.dll

    Filesize

    452KB

    MD5

    f26684a0b0999413be6751f335603471

    SHA1

    dcd054328740c4bbf00e11b0b8f00a00f311898d

    SHA256

    44e56185af5aae005e0298397e75ba0792a9cbb61341ddf07635536c62630890

    SHA512

    d1358b7142ca466a3ad17f09cdc283546aad9ebc454abf06f7673d46e4c5c59280d0bc673b4bdc557e3032d27aa261667de4284e9fc7d46aba64f89da807df3e

  • C:\Users\Admin\AppData\Local\Temp\is-KBCSE.tmp\ISDone.dll

    Filesize

    452KB

    MD5

    f26684a0b0999413be6751f335603471

    SHA1

    dcd054328740c4bbf00e11b0b8f00a00f311898d

    SHA256

    44e56185af5aae005e0298397e75ba0792a9cbb61341ddf07635536c62630890

    SHA512

    d1358b7142ca466a3ad17f09cdc283546aad9ebc454abf06f7673d46e4c5c59280d0bc673b4bdc557e3032d27aa261667de4284e9fc7d46aba64f89da807df3e

  • C:\Users\Admin\AppData\Local\Temp\is-KBCSE.tmp\b2p.dll

    Filesize

    22KB

    MD5

    ab35386487b343e3e82dbd2671ff9dab

    SHA1

    03591d07aea3309b631a7d3a6e20a92653e199b8

    SHA256

    c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2

    SHA512

    b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09

  • C:\Users\Admin\AppData\Local\Temp\is-KBCSE.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • C:\Users\Admin\AppData\Local\Temp\is-KBCSE.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • C:\Users\Admin\AppData\Local\Temp\is-KBCSE.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • C:\Users\Admin\AppData\Local\Temp\is-M818I.tmp\setup.tmp

    Filesize

    1.6MB

    MD5

    36da68f5c3a7fe4dd3f589941160ac85

    SHA1

    71c610db1bc62c9af3d23f819433a6cd89432fe8

    SHA256

    95883809e3356924097775a13407a43bcf48aca640b7d795ea2ef4e2d261285e

    SHA512

    56c3431cab652fda44c4a102f8d16ccd7b9f96aebdb1a63bfc9c6f5e0dec99607562574f40e5e7a8666d8d5f76b6b4d8e8baef1b0629f1f64cf32786f8fb146c

  • C:\Users\Admin\AppData\Local\Temp\is-M818I.tmp\setup.tmp

    Filesize

    1.6MB

    MD5

    36da68f5c3a7fe4dd3f589941160ac85

    SHA1

    71c610db1bc62c9af3d23f819433a6cd89432fe8

    SHA256

    95883809e3356924097775a13407a43bcf48aca640b7d795ea2ef4e2d261285e

    SHA512

    56c3431cab652fda44c4a102f8d16ccd7b9f96aebdb1a63bfc9c6f5e0dec99607562574f40e5e7a8666d8d5f76b6b4d8e8baef1b0629f1f64cf32786f8fb146c

  • C:\Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    2.9MB

    MD5

    df0fd86748ba867a58e017bb2311990f

    SHA1

    d3a4f8e7ff824d6c8dfcd4c6be6f6435ffd1337e

    SHA256

    716e232390346c61dd7fc36cf381a5355ff825142b3ed5d70901cd1d4dd305f4

    SHA512

    097136bb69d2251de255a36aa5115ed1f27d3283110f56b41ebc0ac1783982ffa76ece756cb03e60a3b5f0dcb42d7899b8f7a3e1398fe1c7a09a3d2a491bb6eb

  • C:\Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    2.9MB

    MD5

    df0fd86748ba867a58e017bb2311990f

    SHA1

    d3a4f8e7ff824d6c8dfcd4c6be6f6435ffd1337e

    SHA256

    716e232390346c61dd7fc36cf381a5355ff825142b3ed5d70901cd1d4dd305f4

    SHA512

    097136bb69d2251de255a36aa5115ed1f27d3283110f56b41ebc0ac1783982ffa76ece756cb03e60a3b5f0dcb42d7899b8f7a3e1398fe1c7a09a3d2a491bb6eb

  • C:\Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    2.9MB

    MD5

    df0fd86748ba867a58e017bb2311990f

    SHA1

    d3a4f8e7ff824d6c8dfcd4c6be6f6435ffd1337e

    SHA256

    716e232390346c61dd7fc36cf381a5355ff825142b3ed5d70901cd1d4dd305f4

    SHA512

    097136bb69d2251de255a36aa5115ed1f27d3283110f56b41ebc0ac1783982ffa76ece756cb03e60a3b5f0dcb42d7899b8f7a3e1398fe1c7a09a3d2a491bb6eb

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    4.6MB

    MD5

    22b86c4bdd3a476351ebe051e2af9564

    SHA1

    10c9928d20a1e272f58fef1a56434deabae68aa4

    SHA256

    fd37e08f7e809d14f9e73f802ac0a35c6cea8bfb1261504cafc660d306c21c45

    SHA512

    fd7e047096015472705e8127f66faa50d71f0e527a4d5b708a16f02289778c18ecd7715f35a37cdaa88a8a9c2786b369b0e23e4009be4f93a79ca0675f2ed982

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    4.6MB

    MD5

    22b86c4bdd3a476351ebe051e2af9564

    SHA1

    10c9928d20a1e272f58fef1a56434deabae68aa4

    SHA256

    fd37e08f7e809d14f9e73f802ac0a35c6cea8bfb1261504cafc660d306c21c45

    SHA512

    fd7e047096015472705e8127f66faa50d71f0e527a4d5b708a16f02289778c18ecd7715f35a37cdaa88a8a9c2786b369b0e23e4009be4f93a79ca0675f2ed982

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    4.6MB

    MD5

    22b86c4bdd3a476351ebe051e2af9564

    SHA1

    10c9928d20a1e272f58fef1a56434deabae68aa4

    SHA256

    fd37e08f7e809d14f9e73f802ac0a35c6cea8bfb1261504cafc660d306c21c45

    SHA512

    fd7e047096015472705e8127f66faa50d71f0e527a4d5b708a16f02289778c18ecd7715f35a37cdaa88a8a9c2786b369b0e23e4009be4f93a79ca0675f2ed982

  • memory/632-270-0x0000000005B60000-0x0000000005B61000-memory.dmp

    Filesize

    4KB

  • memory/632-214-0x0000000005870000-0x000000000587F000-memory.dmp

    Filesize

    60KB

  • memory/632-194-0x0000000005860000-0x0000000005862000-memory.dmp

    Filesize

    8KB

  • memory/632-193-0x00000000748A0000-0x00000000748B1000-memory.dmp

    Filesize

    68KB

  • memory/632-175-0x0000000003260000-0x00000000032D7000-memory.dmp

    Filesize

    476KB

  • memory/632-212-0x0000000003260000-0x00000000032D7000-memory.dmp

    Filesize

    476KB

  • memory/632-190-0x0000000005870000-0x000000000587F000-memory.dmp

    Filesize

    60KB

  • memory/632-273-0x0000000000400000-0x00000000005AC000-memory.dmp

    Filesize

    1.7MB

  • memory/632-165-0x0000000002440000-0x0000000002441000-memory.dmp

    Filesize

    4KB

  • memory/632-229-0x0000000005870000-0x000000000587F000-memory.dmp

    Filesize

    60KB

  • memory/632-215-0x0000000002440000-0x0000000002441000-memory.dmp

    Filesize

    4KB

  • memory/632-211-0x0000000000400000-0x00000000005AC000-memory.dmp

    Filesize

    1.7MB

  • memory/792-210-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/792-158-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/1072-206-0x0000000005950000-0x0000000005960000-memory.dmp

    Filesize

    64KB

  • memory/1072-219-0x0000000005950000-0x0000000005960000-memory.dmp

    Filesize

    64KB

  • memory/1072-157-0x0000000000B30000-0x0000000000FE0000-memory.dmp

    Filesize

    4.7MB

  • memory/1072-196-0x0000000005C50000-0x0000000005CB6000-memory.dmp

    Filesize

    408KB

  • memory/5100-232-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/5100-239-0x0000000001FD0000-0x0000000001FF0000-memory.dmp

    Filesize

    128KB

  • memory/5100-208-0x00000000001F0000-0x0000000000200000-memory.dmp

    Filesize

    64KB

  • memory/5100-230-0x0000000001FB0000-0x0000000001FD0000-memory.dmp

    Filesize

    128KB

  • memory/5100-231-0x0000000001FD0000-0x0000000001FF0000-memory.dmp

    Filesize

    128KB

  • memory/5100-209-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/5100-238-0x0000000001FB0000-0x0000000001FD0000-memory.dmp

    Filesize

    128KB

  • memory/5100-224-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/5100-240-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/5100-246-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/5100-252-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/5100-258-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/5100-264-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/5100-217-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/5100-271-0x0000000140000000-0x0000000140CDE000-memory.dmp

    Filesize

    12.9MB

  • memory/5100-216-0x0000000000410000-0x0000000000430000-memory.dmp

    Filesize

    128KB