Analysis
-
max time kernel
97s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
02-11-2023 04:52
Behavioral task
behavioral1
Sample
93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe
Resource
win7-20231020-en
General
-
Target
93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe
-
Size
4.1MB
-
MD5
ca4b4a453bd6ce61fb70cc8ec70aad4b
-
SHA1
7c13390a6a6f8fd3232b7f4348fc631c32713301
-
SHA256
93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5
-
SHA512
35d83f0a1defce25b71a24fed773905a84d9c479fb749e049ddf532c3a3b637de1ba7cd39fb01fa8a732aced416ec3ad80f494629e515e3f7acbb493bd3d3675
-
SSDEEP
49152:bBtjBhz6OfiQc66RTsS01TEhZ1ApkmBJEzOwcsOfkCVVIEhSuDG0fdmO:FhzjfhlbTEhLYECwcZs+VhhS6fcO
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4228-0-0x0000000000FC0000-0x00000000013D0000-memory.dmp family_zgrat_v1 -
Detects DLL dropped by Raspberry Robin. 5 IoCs
Raspberry Robin.
resource yara_rule behavioral2/memory/5068-38-0x0000000075190000-0x0000000075352000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/5068-42-0x0000000075190000-0x0000000075352000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/5068-43-0x0000000075190000-0x0000000075352000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/5068-53-0x0000000075190000-0x0000000075352000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/5068-65-0x0000000075190000-0x0000000075352000-memory.dmp Raspberry_Robin_DLL_MAY_2022 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fuhksvwrcbddad.exe -
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/5068-49-0x0000000000DC0000-0x0000000001864000-memory.dmp loaderbot -
XMRig Miner payload 27 IoCs
resource yara_rule behavioral2/memory/1188-68-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-69-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-70-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-75-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-80-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-81-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-82-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-83-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-84-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-85-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-86-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-87-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-88-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-89-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-90-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-91-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-92-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-93-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-94-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-95-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-96-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-97-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-98-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-99-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-100-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-101-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/1188-102-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fuhksvwrcbddad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fuhksvwrcbddad.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url fuhksvwrcbddad.exe -
Executes dropped EXE 2 IoCs
pid Process 5068 fuhksvwrcbddad.exe 1188 Driver.exe -
Loads dropped DLL 1 IoCs
pid Process 4228 93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe -
resource yara_rule behavioral2/files/0x000700000001aba1-36.dat themida behavioral2/files/0x000700000001aba1-35.dat themida behavioral2/memory/5068-49-0x0000000000DC0000-0x0000000001864000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1534848907-968546671-3000393597-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\fuhksvwrcbddad.exe" fuhksvwrcbddad.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fuhksvwrcbddad.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5068 fuhksvwrcbddad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4228 set thread context of 2476 4228 93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe 71 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe 2476 RegSvcs.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 608 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5068 fuhksvwrcbddad.exe Token: SeLockMemoryPrivilege 1188 Driver.exe Token: SeLockMemoryPrivilege 1188 Driver.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4228 wrote to memory of 2476 4228 93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe 71 PID 4228 wrote to memory of 2476 4228 93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe 71 PID 4228 wrote to memory of 2476 4228 93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe 71 PID 4228 wrote to memory of 2476 4228 93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe 71 PID 4228 wrote to memory of 2476 4228 93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe 71 PID 4228 wrote to memory of 2476 4228 93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe 71 PID 4228 wrote to memory of 2476 4228 93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe 71 PID 4228 wrote to memory of 2476 4228 93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe 71 PID 4228 wrote to memory of 2476 4228 93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe 71 PID 2476 wrote to memory of 5068 2476 RegSvcs.exe 72 PID 2476 wrote to memory of 5068 2476 RegSvcs.exe 72 PID 2476 wrote to memory of 5068 2476 RegSvcs.exe 72 PID 5068 wrote to memory of 1188 5068 fuhksvwrcbddad.exe 75 PID 5068 wrote to memory of 1188 5068 fuhksvwrcbddad.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe"C:\Users\Admin\AppData\Local\Temp\93c9a22d4c887be2f5558aa1fc8a809ef03549cc6a3241ee8fccae1f199ac0e5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\fuhksvwrcbddad.exe"C:\Users\Admin\AppData\Local\Temp\fuhksvwrcbddad.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 42K92y1uNN7PxEp57QZPiLQogD8pGGRjWQnqEemCTsXMSnqrhagsVujaeBc38hqrX88YL8Wh9pNQHRzTN7GBw8SqQkGBwg7 -p x -k -v=0 --donate-level=1 -t 44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5fcae6470428b538abaed4b90123bacda
SHA197286c0292a000e6d29dd519c986d21fb740310f
SHA2567ba39c5a74884e46e0d746f74858622917153f1686a079ba0992b00468c844ad
SHA512ae9bec21dd44da2cc42935eb257a6f111a091f9c469bd1bfa6682235b9350bfa5531c1fefabc921f2abed7f3e4d5616def0a7ddad8b77bf64361e6b3c32eedab
-
Filesize
4.4MB
MD5fcae6470428b538abaed4b90123bacda
SHA197286c0292a000e6d29dd519c986d21fb740310f
SHA2567ba39c5a74884e46e0d746f74858622917153f1686a079ba0992b00468c844ad
SHA512ae9bec21dd44da2cc42935eb257a6f111a091f9c469bd1bfa6682235b9350bfa5531c1fefabc921f2abed7f3e4d5616def0a7ddad8b77bf64361e6b3c32eedab
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719