Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 01:41

General

  • Target

    9a4c96b227213b7049f851572487d42c994220bbf584f631bf347a507b684c1a.exe

  • Size

    4.8MB

  • MD5

    1fecbc51b5620e578c48a12ebeb19bc2

  • SHA1

    94fe551f4fb3ff76a0be99a962dc20fc2656453e

  • SHA256

    9a4c96b227213b7049f851572487d42c994220bbf584f631bf347a507b684c1a

  • SHA512

    ede6f39946562e253fcafe225292db32ba30f9476557304ae1769830e3a46c660920c304ca42d52544411e41acfc1bf206c829c98d61948cb595b1fa0105e2d7

  • SSDEEP

    98304:6qwWqwfM8jZlts7Dnfg+u5NIg1GbnBH9Ltl4NFA0kA8X1KpWQMg:6qwWqw0v7DnZu5NnobnDtl4TjZ8X1/Qf

Malware Config

Extracted

Family

loaderbot

C2

https://cv99160.tw1.ru/cmd.php

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 2 IoCs
  • XMRig Miner payload 14 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a4c96b227213b7049f851572487d42c994220bbf584f631bf347a507b684c1a.exe
    "C:\Users\Admin\AppData\Local\Temp\9a4c96b227213b7049f851572487d42c994220bbf584f631bf347a507b684c1a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3720
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rolex.exe
        rolex.exe -priverdD
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\yondex.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\yondex.exe"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
            "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 49P3pcAzUyQGZCctcW2i6KGBfC5noZALZ4wryTdxqn8YRbZJnB4f2ee6F7vGGFwqgQEb5QdAe3oWW72bsbnBcPetADGCrmw -p x -k -v=0 --donate-level=0 -t 4
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1204
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4460,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=1300 /prefetch:8
    1⤵
      PID:1224

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat

      Filesize

      36B

      MD5

      ce32eea7c273547d3fb75f8e4191e25a

      SHA1

      07d0edd1f64c799b01da4e670126b4b2c5091dde

      SHA256

      940d3c2d3a6665d5017c0bf64120a71b2ce61106ae015399282ae8f4656cb91f

      SHA512

      56da0be9e79b98fb276a6d5a26b2fe06035d46e299fc6e6cb4e04bb396d119204881518e93f2184a68aa34ff024f81281f131ff0f98cf39541cf857c96da95d4

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rolex.exe

      Filesize

      4.4MB

      MD5

      8866d677a3309a0ad903f37557c5941b

      SHA1

      2b03d0c6cb74defedfc31154c57b073c889ea11a

      SHA256

      ecbccacd00cdf38870bea7d203909da1ea2261477125ff7e0bdcef5f3fc4d17d

      SHA512

      15535e08a5e224941610c90f0ba3921bb3a1911380889d393aedbc2e4806910171c81005cda27d23466292daec606abcb94d0fbf546430d70ea21de15cfe406e

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\yondex.exe

      Filesize

      4.0MB

      MD5

      bd2413c32e34d0031f7881d51ae731ff

      SHA1

      8771733c460f22adc0e1865f0b3f2ac19e9c1001

      SHA256

      277e5a809506398685fe20ba674b7f3f75b2e04a34c2b150a84088b266138894

      SHA512

      612c8b9f86308b13342cef00b9166084bf36f44addd139a0123f84cf9711fb2f03e15e4a0b3d95a6deaafb60bca1cc1436514b2b96f4aaf18b094534c94974cf

    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

      Filesize

      3.9MB

      MD5

      02569a7a91a71133d4a1023bf32aa6f4

      SHA1

      0f16bcb3f3f085d3d3be912195558e9f9680d574

      SHA256

      8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

      SHA512

      534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

    • memory/1204-40-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-43-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-36-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-37-0x0000000000440000-0x0000000000454000-memory.dmp

      Filesize

      80KB

    • memory/1204-38-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-39-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-51-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-41-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-42-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-50-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-44-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-45-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-46-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-47-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-48-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/1204-49-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/2972-25-0x0000000005170000-0x00000000051D6000-memory.dmp

      Filesize

      408KB

    • memory/2972-22-0x0000000000220000-0x000000000061E000-memory.dmp

      Filesize

      4.0MB