Analysis
-
max time kernel
24s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 09:08
Static task
static1
Behavioral task
behavioral1
Sample
13f091c04b02de894b2b68404b101f5e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13f091c04b02de894b2b68404b101f5e.exe
Resource
win10v2004-20231215-en
General
-
Target
13f091c04b02de894b2b68404b101f5e.exe
-
Size
2.1MB
-
MD5
13f091c04b02de894b2b68404b101f5e
-
SHA1
77be502649288dc78adfd4d887afd8c2f2e06fae
-
SHA256
e88dc2a26b632c34188248f90b1a9f222d3da628839271d989be8fec039fb714
-
SHA512
a115fed08b8f87c0d2dbf93a12c187c2d58ae5c54753ab7e9e82473cb5e2486bd6a435940ec38148a776436e26e52a9c71ee4f3e4aba6ae1c508488483f192cf
-
SSDEEP
49152:3LeFWZXUM2OSAUhB0ETI++BrpMLdDQXWb+FPWRlW:/UM2DD5IhBrpCFQXk+FPWjW
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/4488-8-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 14 IoCs
resource yara_rule behavioral2/memory/4388-29-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-33-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-34-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-40-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-42-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-43-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-47-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-49-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-50-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-51-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-52-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-53-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-54-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4428-55-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 13f091c04b02de894b2b68404b101f5e.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url 13f091c04b02de894b2b68404b101f5e.exe -
Executes dropped EXE 2 IoCs
pid Process 4388 Driver.exe 4428 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\13f091c04b02de894b2b68404b101f5e.exe" 13f091c04b02de894b2b68404b101f5e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2588 set thread context of 4488 2588 13f091c04b02de894b2b68404b101f5e.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4488 13f091c04b02de894b2b68404b101f5e.exe 4488 13f091c04b02de894b2b68404b101f5e.exe 4488 13f091c04b02de894b2b68404b101f5e.exe 4488 13f091c04b02de894b2b68404b101f5e.exe 4488 13f091c04b02de894b2b68404b101f5e.exe 4488 13f091c04b02de894b2b68404b101f5e.exe 4488 13f091c04b02de894b2b68404b101f5e.exe 4488 13f091c04b02de894b2b68404b101f5e.exe 4488 13f091c04b02de894b2b68404b101f5e.exe 4488 13f091c04b02de894b2b68404b101f5e.exe 4488 13f091c04b02de894b2b68404b101f5e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4488 13f091c04b02de894b2b68404b101f5e.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2588 13f091c04b02de894b2b68404b101f5e.exe Token: SeDebugPrivilege 4488 13f091c04b02de894b2b68404b101f5e.exe Token: SeLockMemoryPrivilege 4388 Driver.exe Token: SeLockMemoryPrivilege 4388 Driver.exe Token: SeLockMemoryPrivilege 4428 Driver.exe Token: SeLockMemoryPrivilege 4428 Driver.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2588 wrote to memory of 3056 2588 13f091c04b02de894b2b68404b101f5e.exe 102 PID 2588 wrote to memory of 3056 2588 13f091c04b02de894b2b68404b101f5e.exe 102 PID 2588 wrote to memory of 3056 2588 13f091c04b02de894b2b68404b101f5e.exe 102 PID 2588 wrote to memory of 4488 2588 13f091c04b02de894b2b68404b101f5e.exe 101 PID 2588 wrote to memory of 4488 2588 13f091c04b02de894b2b68404b101f5e.exe 101 PID 2588 wrote to memory of 4488 2588 13f091c04b02de894b2b68404b101f5e.exe 101 PID 2588 wrote to memory of 4488 2588 13f091c04b02de894b2b68404b101f5e.exe 101 PID 2588 wrote to memory of 4488 2588 13f091c04b02de894b2b68404b101f5e.exe 101 PID 2588 wrote to memory of 4488 2588 13f091c04b02de894b2b68404b101f5e.exe 101 PID 2588 wrote to memory of 4488 2588 13f091c04b02de894b2b68404b101f5e.exe 101 PID 2588 wrote to memory of 4488 2588 13f091c04b02de894b2b68404b101f5e.exe 101 PID 4488 wrote to memory of 4388 4488 13f091c04b02de894b2b68404b101f5e.exe 103 PID 4488 wrote to memory of 4388 4488 13f091c04b02de894b2b68404b101f5e.exe 103 PID 4488 wrote to memory of 4428 4488 13f091c04b02de894b2b68404b101f5e.exe 109 PID 4488 wrote to memory of 4428 4488 13f091c04b02de894b2b68404b101f5e.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe"C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exeC:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49ciCfWrkhQWz6LYXux4LV1P5eAFMfox1H2y3k6VSn7Jb39nDYDUiC6JFCUBDDf63GQqpKc5ZQQ8vCHwgzesAKHtJwB9o2i -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49ciCfWrkhQWz6LYXux4LV1P5eAFMfox1H2y3k6VSn7Jb39nDYDUiC6JFCUBDDf63GQqpKc5ZQQ8vCHwgzesAKHtJwB9o2i -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
-
C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exeC:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe2⤵PID:3056
-