Analysis
-
max time kernel
76s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2023 02:48
Behavioral task
behavioral1
Sample
fesa.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fesa.exe
Resource
win10v2004-20230220-en
General
-
Target
fesa.exe
-
Size
4.0MB
-
MD5
33b4baef7b0a6ad57a7d30af324c4efd
-
SHA1
b169a559615a8448d7ed7da56d36a6850d2092e2
-
SHA256
3a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
-
SHA512
739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
-
SSDEEP
49152:ENDFFPJu8fBsVE6ij+RNg+UKpBvtqB3m1RC3:SzP88fBsnZTgOtqB3m1RC3
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/544-133-0x0000000000170000-0x000000000056E000-memory.dmp loaderbot -
XMRig Miner payload 30 IoCs
resource yara_rule behavioral2/memory/3560-150-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-155-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-156-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-157-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-160-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-163-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-164-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-165-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-166-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-167-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-168-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-169-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-170-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-171-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-172-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-173-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-174-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-175-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-176-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-177-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-178-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-179-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-180-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-181-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-182-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-183-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-184-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-185-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-186-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3636-187-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation fesa.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url fesa.exe -
Executes dropped EXE 2 IoCs
pid Process 3560 Driver.exe 3636 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\fesa.exe" fesa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 936 3560 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe 544 fesa.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 544 fesa.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 544 fesa.exe Token: SeLockMemoryPrivilege 3560 Driver.exe Token: SeLockMemoryPrivilege 3560 Driver.exe Token: SeLockMemoryPrivilege 3636 Driver.exe Token: SeLockMemoryPrivilege 3636 Driver.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 544 wrote to memory of 3560 544 fesa.exe 83 PID 544 wrote to memory of 3560 544 fesa.exe 83 PID 544 wrote to memory of 3636 544 fesa.exe 87 PID 544 wrote to memory of 3636 544 fesa.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fesa.exe"C:\Users\Admin\AppData\Local\Temp\fesa.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3560 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3560 -s 7603⤵
- Program crash
PID:936
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 3560 -ip 35601⤵PID:1740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322