Analysis
-
max time kernel
113s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 08:59
Static task
static1
Behavioral task
behavioral1
Sample
13f091c04b02de894b2b68404b101f5e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13f091c04b02de894b2b68404b101f5e.exe
Resource
win10v2004-20231215-en
General
-
Target
13f091c04b02de894b2b68404b101f5e.exe
-
Size
2.1MB
-
MD5
13f091c04b02de894b2b68404b101f5e
-
SHA1
77be502649288dc78adfd4d887afd8c2f2e06fae
-
SHA256
e88dc2a26b632c34188248f90b1a9f222d3da628839271d989be8fec039fb714
-
SHA512
a115fed08b8f87c0d2dbf93a12c187c2d58ae5c54753ab7e9e82473cb5e2486bd6a435940ec38148a776436e26e52a9c71ee4f3e4aba6ae1c508488483f192cf
-
SSDEEP
49152:3LeFWZXUM2OSAUhB0ETI++BrpMLdDQXWb+FPWRlW:/UM2DD5IhBrpCFQXk+FPWjW
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/4284-11-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/3420-32-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2228-37-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2228-38-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2228-44-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2228-45-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2228-46-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2228-49-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2228-52-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2228-53-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 13f091c04b02de894b2b68404b101f5e.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url 13f091c04b02de894b2b68404b101f5e.exe -
Executes dropped EXE 2 IoCs
pid Process 3420 Driver.exe 2228 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\13f091c04b02de894b2b68404b101f5e.exe" 13f091c04b02de894b2b68404b101f5e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4184 set thread context of 4284 4184 13f091c04b02de894b2b68404b101f5e.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe 4284 13f091c04b02de894b2b68404b101f5e.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4284 13f091c04b02de894b2b68404b101f5e.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4184 13f091c04b02de894b2b68404b101f5e.exe Token: SeDebugPrivilege 4284 13f091c04b02de894b2b68404b101f5e.exe Token: SeLockMemoryPrivilege 3420 Driver.exe Token: SeLockMemoryPrivilege 3420 Driver.exe Token: SeLockMemoryPrivilege 2228 Driver.exe Token: SeLockMemoryPrivilege 2228 Driver.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4184 wrote to memory of 4308 4184 13f091c04b02de894b2b68404b101f5e.exe 100 PID 4184 wrote to memory of 4308 4184 13f091c04b02de894b2b68404b101f5e.exe 100 PID 4184 wrote to memory of 4308 4184 13f091c04b02de894b2b68404b101f5e.exe 100 PID 4184 wrote to memory of 2792 4184 13f091c04b02de894b2b68404b101f5e.exe 102 PID 4184 wrote to memory of 2792 4184 13f091c04b02de894b2b68404b101f5e.exe 102 PID 4184 wrote to memory of 2792 4184 13f091c04b02de894b2b68404b101f5e.exe 102 PID 4184 wrote to memory of 4284 4184 13f091c04b02de894b2b68404b101f5e.exe 101 PID 4184 wrote to memory of 4284 4184 13f091c04b02de894b2b68404b101f5e.exe 101 PID 4184 wrote to memory of 4284 4184 13f091c04b02de894b2b68404b101f5e.exe 101 PID 4184 wrote to memory of 4284 4184 13f091c04b02de894b2b68404b101f5e.exe 101 PID 4184 wrote to memory of 4284 4184 13f091c04b02de894b2b68404b101f5e.exe 101 PID 4184 wrote to memory of 4284 4184 13f091c04b02de894b2b68404b101f5e.exe 101 PID 4184 wrote to memory of 4284 4184 13f091c04b02de894b2b68404b101f5e.exe 101 PID 4184 wrote to memory of 4284 4184 13f091c04b02de894b2b68404b101f5e.exe 101 PID 4284 wrote to memory of 3420 4284 13f091c04b02de894b2b68404b101f5e.exe 106 PID 4284 wrote to memory of 3420 4284 13f091c04b02de894b2b68404b101f5e.exe 106 PID 4284 wrote to memory of 2228 4284 13f091c04b02de894b2b68404b101f5e.exe 112 PID 4284 wrote to memory of 2228 4284 13f091c04b02de894b2b68404b101f5e.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe"C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exeC:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe2⤵PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exeC:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49ciCfWrkhQWz6LYXux4LV1P5eAFMfox1H2y3k6VSn7Jb39nDYDUiC6JFCUBDDf63GQqpKc5ZQQ8vCHwgzesAKHtJwB9o2i -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49ciCfWrkhQWz6LYXux4LV1P5eAFMfox1H2y3k6VSn7Jb39nDYDUiC6JFCUBDDf63GQqpKc5ZQQ8vCHwgzesAKHtJwB9o2i -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
-
C:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exeC:\Users\Admin\AppData\Local\Temp\13f091c04b02de894b2b68404b101f5e.exe2⤵PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\13f091c04b02de894b2b68404b101f5e.exe.log
Filesize605B
MD53654bd2c6957761095206ffdf92b0cb9
SHA16f10f7b5867877de7629afcff644c265e79b4ad3
SHA256c2a4be94cf4ed33d698d9838f4ffb47047da796e733ec11562463a1621212ab4
SHA512e2a81248cca7732ce098088d5237897493fd3629e28d66bc13e5f9191f72cd52893f4a53905906af12d5c6de475738b6c7f6b718a32869e9ee0deb3a54672f79
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322