Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-07-2024 13:22

General

  • Target

    917f9d9d484f8657efc7f60b8adde947.exe

  • Size

    4.6MB

  • MD5

    917f9d9d484f8657efc7f60b8adde947

  • SHA1

    01e4648cef9fb934429d63471127805120202ca9

  • SHA256

    1099655a13691a6c4856fa29fa038e89805c8ff7ba6d04c6c56128728be19ff4

  • SHA512

    6f81636f49ac851709372e04fa4b95a47da1d17bb84c0150fda6f1ee37111ac357ae17414e9d96f597ac99b2693a9b5838d43fc22b12abbed3e6bbf6421635d2

  • SSDEEP

    98304:ybFXaexwoV2rqKxaWkidqVtIhjAgWlZHrtjFsN3RwC+cDhfXXWB:gwexwoVLhidqVtg8jZHrw3wC+8

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 1 IoCs
  • XMRig Miner payload 15 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\917f9d9d484f8657efc7f60b8adde947.exe
    "C:\Users\Admin\AppData\Local\Temp\917f9d9d484f8657efc7f60b8adde947.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:788
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:1124
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:4068
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
            PID:3384
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            2⤵
            • Checks computer location settings
            • Drops startup file
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2028
            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
              "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 44wU5QLtVQR3BYSkYJrSNGJ6jLVgtbpNXM28EiiQyZ7fin6Ki9MnbuCUqghQqJPEon1vZQq1twJ21hupxAhrxeP32CjKnDp -p x -k -v=0 --donate-level=1 -t 4
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:64
            • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
              "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 44wU5QLtVQR3BYSkYJrSNGJ6jLVgtbpNXM28EiiQyZ7fin6Ki9MnbuCUqghQqJPEon1vZQq1twJ21hupxAhrxeP32CjKnDp -p x -k -v=0 --donate-level=1 -t 4
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2640

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

          Filesize

          3.9MB

          MD5

          02569a7a91a71133d4a1023bf32aa6f4

          SHA1

          0f16bcb3f3f085d3d3be912195558e9f9680d574

          SHA256

          8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

          SHA512

          534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

        • memory/64-20-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/64-23-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/64-24-0x0000000001FF0000-0x0000000002010000-memory.dmp

          Filesize

          128KB

        • memory/64-21-0x0000000001FF0000-0x0000000002010000-memory.dmp

          Filesize

          128KB

        • memory/64-19-0x0000000001FD0000-0x0000000001FF0000-memory.dmp

          Filesize

          128KB

        • memory/64-16-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/64-18-0x00000000004D0000-0x00000000004E4000-memory.dmp

          Filesize

          80KB

        • memory/788-0-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

          Filesize

          4KB

        • memory/2028-1-0x0000000000400000-0x00000000007FE000-memory.dmp

          Filesize

          4.0MB

        • memory/2028-29-0x0000000074130000-0x00000000748E0000-memory.dmp

          Filesize

          7.7MB

        • memory/2028-6-0x00000000058A0000-0x0000000005906000-memory.dmp

          Filesize

          408KB

        • memory/2028-2-0x000000007413E000-0x000000007413F000-memory.dmp

          Filesize

          4KB

        • memory/2028-4-0x0000000074130000-0x00000000748E0000-memory.dmp

          Filesize

          7.7MB

        • memory/2028-28-0x000000007413E000-0x000000007413F000-memory.dmp

          Filesize

          4KB

        • memory/2640-27-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-30-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-31-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-32-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-33-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-34-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-35-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-36-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-37-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-38-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-39-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-40-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB

        • memory/2640-41-0x0000000140000000-0x0000000140B75000-memory.dmp

          Filesize

          11.5MB