Analysis

  • max time kernel
    24s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 09:08

General

  • Target

    13f091c04b02de894b2b68404b101f5e.exe

  • Size

    2.1MB

  • MD5

    13f091c04b02de894b2b68404b101f5e

  • SHA1

    77be502649288dc78adfd4d887afd8c2f2e06fae

  • SHA256

    e88dc2a26b632c34188248f90b1a9f222d3da628839271d989be8fec039fb714

  • SHA512

    a115fed08b8f87c0d2dbf93a12c187c2d58ae5c54753ab7e9e82473cb5e2486bd6a435940ec38148a776436e26e52a9c71ee4f3e4aba6ae1c508488483f192cf

  • SSDEEP

    49152:3LeFWZXUM2OSAUhB0ETI++BrpMLdDQXWb+FPWRlW:/UM2DD5IhBrpCFQXk+FPWjW

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 1 IoCs
  • XMRig Miner payload 14 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
    "C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
      C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4488
      • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
        "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49ciCfWrkhQWz6LYXux4LV1P5eAFMfox1H2y3k6VSn7Jb39nDYDUiC6JFCUBDDf63GQqpKc5ZQQ8vCHwgzesAKHtJwB9o2i -p x -k -v=0 --donate-level=1 -t 4
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4388
      • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
        "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49ciCfWrkhQWz6LYXux4LV1P5eAFMfox1H2y3k6VSn7Jb39nDYDUiC6JFCUBDDf63GQqpKc5ZQQ8vCHwgzesAKHtJwB9o2i -p x -k -v=0 --donate-level=1 -t 4
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4428
    • C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
      C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
      2⤵
        PID:3056

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2588-0-0x0000000000740000-0x0000000000954000-memory.dmp

      Filesize

      2.1MB

    • memory/2588-3-0x0000000002D70000-0x0000000002D71000-memory.dmp

      Filesize

      4KB

    • memory/2588-2-0x0000000002DE0000-0x0000000002DF0000-memory.dmp

      Filesize

      64KB

    • memory/2588-5-0x0000000005400000-0x0000000005476000-memory.dmp

      Filesize

      472KB

    • memory/2588-4-0x0000000005350000-0x0000000005370000-memory.dmp

      Filesize

      128KB

    • memory/2588-6-0x00000000053E0000-0x00000000053FE000-memory.dmp

      Filesize

      120KB

    • memory/2588-1-0x0000000075180000-0x0000000075930000-memory.dmp

      Filesize

      7.7MB

    • memory/2588-11-0x0000000075180000-0x0000000075930000-memory.dmp

      Filesize

      7.7MB

    • memory/4388-28-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4388-29-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4388-27-0x0000000000440000-0x0000000000454000-memory.dmp

      Filesize

      80KB

    • memory/4428-36-0x0000000002000000-0x0000000002020000-memory.dmp

      Filesize

      128KB

    • memory/4428-40-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-55-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-54-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-32-0x0000000001FE0000-0x0000000002000000-memory.dmp

      Filesize

      128KB

    • memory/4428-33-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-53-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-34-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-52-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-51-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-39-0x00000000134C0000-0x00000000134E0000-memory.dmp

      Filesize

      128KB

    • memory/4428-38-0x0000000013190000-0x00000000131B0000-memory.dmp

      Filesize

      128KB

    • memory/4428-41-0x00000000137F0000-0x0000000013810000-memory.dmp

      Filesize

      128KB

    • memory/4428-50-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-42-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-43-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-44-0x0000000002000000-0x0000000002020000-memory.dmp

      Filesize

      128KB

    • memory/4428-45-0x0000000013190000-0x00000000131B0000-memory.dmp

      Filesize

      128KB

    • memory/4428-46-0x00000000134C0000-0x00000000134E0000-memory.dmp

      Filesize

      128KB

    • memory/4428-48-0x00000000137F0000-0x0000000013810000-memory.dmp

      Filesize

      128KB

    • memory/4428-47-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4428-49-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4488-16-0x0000000005800000-0x0000000005810000-memory.dmp

      Filesize

      64KB

    • memory/4488-37-0x0000000005800000-0x0000000005810000-memory.dmp

      Filesize

      64KB

    • memory/4488-13-0x0000000075180000-0x0000000075930000-memory.dmp

      Filesize

      7.7MB

    • memory/4488-35-0x0000000075180000-0x0000000075930000-memory.dmp

      Filesize

      7.7MB

    • memory/4488-8-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/4488-15-0x0000000005A10000-0x0000000005A76000-memory.dmp

      Filesize

      408KB