Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07-08-2024 19:35

General

  • Target

    b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe

  • Size

    3.2MB

  • MD5

    ecf0a7dfe54de2c55c42b8c8c34f4a3f

  • SHA1

    393d36cd7cf9536ebc8abe26c51553c57eb4e38c

  • SHA256

    b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676

  • SHA512

    4e51da10f9c75b20776aba885c863d622b4eee8b1c023e909151ed893b1f78812b1aaa1c26c10a3050f8aaccfe148dd9bcc27100e27f9f34eedc5c581573c7db

  • SSDEEP

    49152:3EF4FiPD6m4ivio49aPVYYZJbEU5Jn0KRYElP1Dn9S/FPc63qZ1sRrT:EairJ

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • LoaderBot executable 1 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3268
      • C:\Users\Admin\AppData\Local\Temp\b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe
        "C:\Users\Admin\AppData\Local\Temp\b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: MapViewOfSection
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of WriteProcessMemory
        PID:3552
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -encodedCommand RwBlAHQALQBQAHIAbwBjAGUAcwBzACAALQBOAGEAbQBlACAAJwBlAHgAcABsAG8AcgBlAHIAJwAgAHwAIABTAGUAbABlAGMAdAAtAE8AYgBqAGUAYwB0ACAALQBFAHgAcABhAG4AZABQAHIAbwBwAGUAcgB0AHkAIABJAGQA
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:560
        • C:\Windows\SYSTEM32\cmd.exe
          cmd /C taskkill /F /IM "SmartScreen Defender Windows.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4968
          • C:\Windows\system32\taskkill.exe
            taskkill /F /IM "SmartScreen Defender Windows.exe"
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1544
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:"C:\Users\Admin\AppData\Local\Temp\SmartScreen Defender Windows.exe" /target:winexe /platform:x86 "C:\Users\Admin\AppData\Local\Temp\mUgFnLy.tmp" "C:\Users\Admin\AppData\Local\Temp\rWxlfAf.tmp"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3012
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAC7C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFED26F5FCD444C9BA0A8A688949BE8A9.TMP"
            4⤵
              PID:3520
        • C:\Users\Admin\AppData\Local\Temp\SmartScreen Defender Windows.exe
          "C:\Windows\System32\SmartScreen Defender Windows.exe"
          2⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2932

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RESAC7C.tmp

        Filesize

        2KB

        MD5

        2142558d7fa251d04bbd8f06e916bea3

        SHA1

        ca8aa7d287c376b7a02e10087018238feac3f5b2

        SHA256

        7ce42fea9d4764b29a1d504097160b024a026d80490d2197ca2c95610a7fed68

        SHA512

        44ffd636af6204fca4f696558e059895e94d72d6eaeda0837fb7cc6a2e8bcba02978f94fca76fad53545bd666fa874caed2a4523057f2c5a62faf6da1541255e

      • C:\Users\Admin\AppData\Local\Temp\SmartScreen Defender Windows.exe

        Filesize

        5KB

        MD5

        f64c000823f7aee4abcbc2b285dbd6c7

        SHA1

        b63af12ccae95d49c93793fd493106b16df76c33

        SHA256

        b8ec4d2b82e71093de4004831b486b0d122c5c8ea89c78cfb54c1a0c68428a2e

        SHA512

        560fd32cc696f26bc74b2c032bd5b546423b2900cf736da44f35774816faa4968b4ae788292b40d3b3befe13d4ff046681822f987950d37c46f0216f125b5ce6

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_505id3ap.g1x.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\ffwzuX.tmp

        Filesize

        2.0MB

        MD5

        9983a1154c41a5226112ecc8d0cece39

        SHA1

        48cfebe21bec4097ac0956d17302b205a1d5e490

        SHA256

        6c10d7244997ea10ec016d7e4d32dba96107ba655794ce0bda44375a80d4f3aa

        SHA512

        3a10518d574a9e81079553d3653f5ca629128232bc0b00f4beb49b9a8843994179c0dea7095c2b0b4399c9fc7a99795f9bb45193e608f3f8682821f2ae88f0e1

      • \??\c:\Users\Admin\AppData\Local\Temp\CSCFED26F5FCD444C9BA0A8A688949BE8A9.TMP

        Filesize

        1KB

        MD5

        0ca43bb14dfd260c186da0e08d4bc3ce

        SHA1

        3487e73968a1f021e5da09bdfbbef9fdf4d76fbe

        SHA256

        0f97429a0a458a058c14b006da7cd6861e3a9b02a3c55ad2612a835c63ee345d

        SHA512

        220ebd41cf44713e89d9f860cbe7da49275b276f7ab3c10c540d76f34474ea156e35c2b77624752ddec5ab58a06c4050f3de21ac5342e68e94bd10c108eb2852

      • \??\c:\Users\Admin\AppData\Local\Temp\mUgFnLy.tmp

        Filesize

        346B

        MD5

        c5dbc6417d134e6aea5e58ad55bf33ba

        SHA1

        91699068965ac21ff6cf80edd18a3576c6aacc98

        SHA256

        f96c695e5b61703ed2f4ef9bc3917023adf3bc30fad044ceea47fe9b9a8a3894

        SHA512

        f0a6e724a8d53e35e04b5004d99ff466682881b63fd7f1ea348c3a7fe681d8bdaee090664570d0ab73c7dda87bf7d7c53eadb0284360f6b8e4943d8acd7860eb

      • \??\c:\Users\Admin\AppData\Local\Temp\rWxlfAf.tmp

        Filesize

        607B

        MD5

        9154be5d772ad1d5449465a279fde323

        SHA1

        4d56f8c6dc5d24bf34e456692eb215a7b12bc2f0

        SHA256

        eb92b246dd427015cf6ea53c0394d5a9cae339d080dd25ebac05de646b9fa480

        SHA512

        3bb62fe5a57172f3ff85c143dac99546eb0883cbd1dcaa9d557d019486dda3db89e4b9aa86218277feb1cc374aec686d448ea6dae079aca5e33d2659034db625

      • memory/560-18-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/560-32-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/560-29-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/560-25-0x000001F169F90000-0x000001F169FB2000-memory.dmp

        Filesize

        136KB

      • memory/560-19-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/560-17-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/2932-45-0x0000000000EB0000-0x0000000000EB8000-memory.dmp

        Filesize

        32KB

      • memory/2932-52-0x0000000005970000-0x0000000005B4C000-memory.dmp

        Filesize

        1.9MB

      • memory/2932-51-0x0000000006830000-0x0000000006896000-memory.dmp

        Filesize

        408KB

      • memory/2932-48-0x00000000068F0000-0x0000000006CEE000-memory.dmp

        Filesize

        4.0MB

      • memory/2932-46-0x0000000005970000-0x0000000005B4C000-memory.dmp

        Filesize

        1.9MB

      • memory/3552-14-0x00007FFE65281000-0x00007FFE653AA000-memory.dmp

        Filesize

        1.2MB

      • memory/3552-3-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-7-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-9-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-16-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-15-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-11-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-6-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-10-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-5-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-47-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-8-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-4-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB

      • memory/3552-2-0x00007FFE65280000-0x00007FFE65489000-memory.dmp

        Filesize

        2.0MB