Analysis

  • max time kernel
    113s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 08:59

General

  • Target

    13f091c04b02de894b2b68404b101f5e.exe

  • Size

    2.1MB

  • MD5

    13f091c04b02de894b2b68404b101f5e

  • SHA1

    77be502649288dc78adfd4d887afd8c2f2e06fae

  • SHA256

    e88dc2a26b632c34188248f90b1a9f222d3da628839271d989be8fec039fb714

  • SHA512

    a115fed08b8f87c0d2dbf93a12c187c2d58ae5c54753ab7e9e82473cb5e2486bd6a435940ec38148a776436e26e52a9c71ee4f3e4aba6ae1c508488483f192cf

  • SSDEEP

    49152:3LeFWZXUM2OSAUhB0ETI++BrpMLdDQXWb+FPWRlW:/UM2DD5IhBrpCFQXk+FPWjW

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 1 IoCs
  • XMRig Miner payload 9 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
    "C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
      C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
      2⤵
        PID:4308
      • C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
        C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
        2⤵
        • Checks computer location settings
        • Drops startup file
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4284
        • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
          "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49ciCfWrkhQWz6LYXux4LV1P5eAFMfox1H2y3k6VSn7Jb39nDYDUiC6JFCUBDDf63GQqpKc5ZQQ8vCHwgzesAKHtJwB9o2i -p x -k -v=0 --donate-level=1 -t 4
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3420
        • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
          "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49ciCfWrkhQWz6LYXux4LV1P5eAFMfox1H2y3k6VSn7Jb39nDYDUiC6JFCUBDDf63GQqpKc5ZQQ8vCHwgzesAKHtJwB9o2i -p x -k -v=0 --donate-level=1 -t 4
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2228
      • C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
        C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe
        2⤵
          PID:2792

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\13f091c04b02de894b2b68404b101f5e.exe.log

        Filesize

        605B

        MD5

        3654bd2c6957761095206ffdf92b0cb9

        SHA1

        6f10f7b5867877de7629afcff644c265e79b4ad3

        SHA256

        c2a4be94cf4ed33d698d9838f4ffb47047da796e733ec11562463a1621212ab4

        SHA512

        e2a81248cca7732ce098088d5237897493fd3629e28d66bc13e5f9191f72cd52893f4a53905906af12d5c6de475738b6c7f6b718a32869e9ee0deb3a54672f79

      • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

        Filesize

        3.9MB

        MD5

        02569a7a91a71133d4a1023bf32aa6f4

        SHA1

        0f16bcb3f3f085d3d3be912195558e9f9680d574

        SHA256

        8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

        SHA512

        534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

      • memory/2228-46-0x0000000140000000-0x0000000140B75000-memory.dmp

        Filesize

        11.5MB

      • memory/2228-52-0x0000000140000000-0x0000000140B75000-memory.dmp

        Filesize

        11.5MB

      • memory/2228-50-0x0000000002040000-0x0000000002060000-memory.dmp

        Filesize

        128KB

      • memory/2228-49-0x0000000140000000-0x0000000140B75000-memory.dmp

        Filesize

        11.5MB

      • memory/2228-48-0x0000000002010000-0x0000000002030000-memory.dmp

        Filesize

        128KB

      • memory/2228-47-0x0000000001FF0000-0x0000000002010000-memory.dmp

        Filesize

        128KB

      • memory/2228-35-0x0000000001FD0000-0x0000000001FF0000-memory.dmp

        Filesize

        128KB

      • memory/2228-45-0x0000000140000000-0x0000000140B75000-memory.dmp

        Filesize

        11.5MB

      • memory/2228-44-0x0000000140000000-0x0000000140B75000-memory.dmp

        Filesize

        11.5MB

      • memory/2228-51-0x0000000002060000-0x0000000002080000-memory.dmp

        Filesize

        128KB

      • memory/2228-43-0x0000000002060000-0x0000000002080000-memory.dmp

        Filesize

        128KB

      • memory/2228-42-0x0000000002040000-0x0000000002060000-memory.dmp

        Filesize

        128KB

      • memory/2228-41-0x0000000002010000-0x0000000002030000-memory.dmp

        Filesize

        128KB

      • memory/2228-39-0x0000000001FF0000-0x0000000002010000-memory.dmp

        Filesize

        128KB

      • memory/2228-53-0x0000000140000000-0x0000000140B75000-memory.dmp

        Filesize

        11.5MB

      • memory/2228-38-0x0000000140000000-0x0000000140B75000-memory.dmp

        Filesize

        11.5MB

      • memory/2228-37-0x0000000140000000-0x0000000140B75000-memory.dmp

        Filesize

        11.5MB

      • memory/3420-30-0x0000000140000000-0x0000000140B75000-memory.dmp

        Filesize

        11.5MB

      • memory/3420-31-0x0000000000510000-0x0000000000524000-memory.dmp

        Filesize

        80KB

      • memory/3420-32-0x0000000140000000-0x0000000140B75000-memory.dmp

        Filesize

        11.5MB

      • memory/4184-7-0x0000000005080000-0x00000000050F6000-memory.dmp

        Filesize

        472KB

      • memory/4184-1-0x0000000000140000-0x0000000000354000-memory.dmp

        Filesize

        2.1MB

      • memory/4184-0-0x00000000746E0000-0x0000000074E90000-memory.dmp

        Filesize

        7.7MB

      • memory/4184-2-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4184-3-0x0000000002770000-0x0000000002771000-memory.dmp

        Filesize

        4KB

      • memory/4184-16-0x00000000746E0000-0x0000000074E90000-memory.dmp

        Filesize

        7.7MB

      • memory/4184-4-0x00000000746E0000-0x0000000074E90000-memory.dmp

        Filesize

        7.7MB

      • memory/4184-5-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4184-6-0x0000000004FE0000-0x0000000005000000-memory.dmp

        Filesize

        128KB

      • memory/4184-8-0x0000000005060000-0x000000000507E000-memory.dmp

        Filesize

        120KB

      • memory/4284-19-0x0000000005800000-0x0000000005866000-memory.dmp

        Filesize

        408KB

      • memory/4284-11-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/4284-14-0x00000000746E0000-0x0000000074E90000-memory.dmp

        Filesize

        7.7MB

      • memory/4284-18-0x00000000055F0000-0x0000000005600000-memory.dmp

        Filesize

        64KB

      • memory/4284-40-0x00000000055F0000-0x0000000005600000-memory.dmp

        Filesize

        64KB

      • memory/4284-36-0x00000000746E0000-0x0000000074E90000-memory.dmp

        Filesize

        7.7MB