Analysis

  • max time kernel
    184s
  • max time network
    216s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2023 12:52

General

  • Target

    2648-24-0x0000000000E00000-0x0000000001834000-memory.exe

  • Size

    10.2MB

  • MD5

    02b4c592b543df48b80a09946a001aab

  • SHA1

    14f6d57fd3d15623e426c82d56a349765df67dff

  • SHA256

    2425703be93685d101d68f68f005c25b61330cfc3efc017e984630cde7760c79

  • SHA512

    3bdfcbad1c13e534d8c587a0bbf148489c3d081a84372b8ad82818bdc0d95b71bb8d10c5dac50c1422ef073c0021efb7951828c5ebf936363075dad2e44748c6

  • SSDEEP

    98304:nzP88fBsnZTgOtqB3m1RC3hORpug4ORd0Xw4bBv+eszWpJj1z2ge+u/3qXuD5Oxc:DrpkE3aRC32f4bprsyJ4g3uPIuFKay

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 1 IoCs
  • XMRig Miner payload 13 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2648-24-0x0000000000E00000-0x0000000001834000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2648-24-0x0000000000E00000-0x0000000001834000-memory.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 42K92y1uNN7PxEp57QZPiLQogD8pGGRjWQnqEemCTsXMSnqrhagsVujaeBc38hqrX88YL8Wh9pNQHRzTN7GBw8SqQkGBwg7 -p x -k -v=0 --donate-level=1 -t 4
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4280
    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 42K92y1uNN7PxEp57QZPiLQogD8pGGRjWQnqEemCTsXMSnqrhagsVujaeBc38hqrX88YL8Wh9pNQHRzTN7GBw8SqQkGBwg7 -p x -k -v=0 --donate-level=1 -t 4
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2812
    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 42K92y1uNN7PxEp57QZPiLQogD8pGGRjWQnqEemCTsXMSnqrhagsVujaeBc38hqrX88YL8Wh9pNQHRzTN7GBw8SqQkGBwg7 -p x -k -v=0 --donate-level=1 -t 4
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    3.9MB

    MD5

    02569a7a91a71133d4a1023bf32aa6f4

    SHA1

    0f16bcb3f3f085d3d3be912195558e9f9680d574

    SHA256

    8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

    SHA512

    534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    3.9MB

    MD5

    02569a7a91a71133d4a1023bf32aa6f4

    SHA1

    0f16bcb3f3f085d3d3be912195558e9f9680d574

    SHA256

    8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

    SHA512

    534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    3.9MB

    MD5

    02569a7a91a71133d4a1023bf32aa6f4

    SHA1

    0f16bcb3f3f085d3d3be912195558e9f9680d574

    SHA256

    8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

    SHA512

    534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    3.9MB

    MD5

    02569a7a91a71133d4a1023bf32aa6f4

    SHA1

    0f16bcb3f3f085d3d3be912195558e9f9680d574

    SHA256

    8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

    SHA512

    534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    3.9MB

    MD5

    02569a7a91a71133d4a1023bf32aa6f4

    SHA1

    0f16bcb3f3f085d3d3be912195558e9f9680d574

    SHA256

    8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

    SHA512

    534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

  • memory/1384-7-0x00000000058B0000-0x00000000058C0000-memory.dmp

    Filesize

    64KB

  • memory/1384-1-0x0000000000450000-0x0000000000E84000-memory.dmp

    Filesize

    10.2MB

  • memory/1384-6-0x0000000005B30000-0x0000000005B96000-memory.dmp

    Filesize

    408KB

  • memory/1384-5-0x00000000058B0000-0x00000000058C0000-memory.dmp

    Filesize

    64KB

  • memory/1384-0-0x00000000749D0000-0x0000000075180000-memory.dmp

    Filesize

    7.7MB

  • memory/1384-4-0x00000000749D0000-0x0000000075180000-memory.dmp

    Filesize

    7.7MB

  • memory/2812-24-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/2812-33-0x0000000002020000-0x0000000002040000-memory.dmp

    Filesize

    128KB

  • memory/2812-23-0x0000000000530000-0x0000000000550000-memory.dmp

    Filesize

    128KB

  • memory/2812-34-0x0000000002040000-0x0000000002060000-memory.dmp

    Filesize

    128KB

  • memory/2812-25-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/2812-26-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/2812-27-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/2812-28-0x0000000000550000-0x0000000000570000-memory.dmp

    Filesize

    128KB

  • memory/2812-29-0x0000000002020000-0x0000000002040000-memory.dmp

    Filesize

    128KB

  • memory/2812-30-0x0000000002040000-0x0000000002060000-memory.dmp

    Filesize

    128KB

  • memory/2812-31-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/2812-32-0x0000000000550000-0x0000000000570000-memory.dmp

    Filesize

    128KB

  • memory/3828-41-0x0000000002000000-0x0000000002020000-memory.dmp

    Filesize

    128KB

  • memory/3828-43-0x0000000002040000-0x0000000002060000-memory.dmp

    Filesize

    128KB

  • memory/3828-51-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/3828-37-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/3828-38-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/3828-39-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/3828-40-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/3828-50-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/3828-42-0x0000000002020000-0x0000000002040000-memory.dmp

    Filesize

    128KB

  • memory/3828-49-0x0000000002060000-0x0000000002080000-memory.dmp

    Filesize

    128KB

  • memory/3828-44-0x0000000002060000-0x0000000002080000-memory.dmp

    Filesize

    128KB

  • memory/3828-45-0x0000000002000000-0x0000000002020000-memory.dmp

    Filesize

    128KB

  • memory/3828-46-0x0000000002020000-0x0000000002040000-memory.dmp

    Filesize

    128KB

  • memory/3828-47-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/3828-48-0x0000000002040000-0x0000000002060000-memory.dmp

    Filesize

    128KB

  • memory/4280-20-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/4280-19-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/4280-18-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB