Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
05-05-2021 13:02
Static task
static1
Behavioral task
behavioral1
Sample
notepad.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
notepad.exe
Resource
win10v20210408
General
-
Target
notepad.exe
-
Size
2.8MB
-
MD5
4930920087503d221d8bb13e1514620b
-
SHA1
07e2d9be6cce22e6b1b44992acf2d536c3675e07
-
SHA256
5cf202837c24442de4f09ee9a152c77f911b405541fd30567bcc370ef61f5f75
-
SHA512
9204d17902fb794600e5efb538f0269340393a84cf3c72ceb27884ab1f5f215a46c42a9f5de457167953d9bcdf7148d9a3b12d22812347af20e5e073a2802f0f
Malware Config
Signatures
-
XMRig Miner Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/396-67-0x0000000000A14AA0-mapping.dmp xmrig behavioral1/memory/396-68-0x0000000000400000-0x0000000000A16000-memory.dmp xmrig behavioral1/memory/396-72-0x0000000000401000-0x0000000000938000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral1/memory/396-65-0x0000000000400000-0x0000000000A16000-memory.dmp upx behavioral1/memory/396-66-0x0000000000400000-0x0000000000A16000-memory.dmp upx behavioral1/memory/396-68-0x0000000000400000-0x0000000000A16000-memory.dmp upx -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\viTRMUuKeV.url wscript.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
notepad.exenotepad.exedescription pid process target process PID 1084 set thread context of 2024 1084 notepad.exe notepad.exe PID 2024 set thread context of 396 2024 notepad.exe notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
notepad.exepid process 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe 2024 notepad.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
notepad.exenotepad.exedescription pid process Token: SeDebugPrivilege 2024 notepad.exe Token: SeLockMemoryPrivilege 396 notepad.exe Token: SeLockMemoryPrivilege 396 notepad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
notepad.exepid process 1084 notepad.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
notepad.exenotepad.execmd.exedescription pid process target process PID 1084 wrote to memory of 2024 1084 notepad.exe notepad.exe PID 1084 wrote to memory of 2024 1084 notepad.exe notepad.exe PID 1084 wrote to memory of 2024 1084 notepad.exe notepad.exe PID 1084 wrote to memory of 2024 1084 notepad.exe notepad.exe PID 1084 wrote to memory of 2024 1084 notepad.exe notepad.exe PID 1084 wrote to memory of 2024 1084 notepad.exe notepad.exe PID 1084 wrote to memory of 2024 1084 notepad.exe notepad.exe PID 1084 wrote to memory of 2024 1084 notepad.exe notepad.exe PID 1084 wrote to memory of 2024 1084 notepad.exe notepad.exe PID 1084 wrote to memory of 2024 1084 notepad.exe notepad.exe PID 2024 wrote to memory of 396 2024 notepad.exe notepad.exe PID 2024 wrote to memory of 396 2024 notepad.exe notepad.exe PID 2024 wrote to memory of 396 2024 notepad.exe notepad.exe PID 2024 wrote to memory of 396 2024 notepad.exe notepad.exe PID 2024 wrote to memory of 396 2024 notepad.exe notepad.exe PID 2024 wrote to memory of 396 2024 notepad.exe notepad.exe PID 2024 wrote to memory of 396 2024 notepad.exe notepad.exe PID 2024 wrote to memory of 396 2024 notepad.exe notepad.exe PID 2024 wrote to memory of 396 2024 notepad.exe notepad.exe PID 2024 wrote to memory of 396 2024 notepad.exe notepad.exe PID 2024 wrote to memory of 1424 2024 notepad.exe cmd.exe PID 2024 wrote to memory of 1424 2024 notepad.exe cmd.exe PID 2024 wrote to memory of 1424 2024 notepad.exe cmd.exe PID 2024 wrote to memory of 1424 2024 notepad.exe cmd.exe PID 2024 wrote to memory of 1424 2024 notepad.exe cmd.exe PID 2024 wrote to memory of 1424 2024 notepad.exe cmd.exe PID 1424 wrote to memory of 320 1424 cmd.exe wscript.exe PID 1424 wrote to memory of 320 1424 cmd.exe wscript.exe PID 1424 wrote to memory of 320 1424 cmd.exe wscript.exe PID 1424 wrote to memory of 320 1424 cmd.exe wscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\notepad.exe"C:\Users\Admin\AppData\Local\Temp\notepad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\notepad.exe"C:\Users\Admin\AppData\Local\Temp\notepad.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /C WScript "C:\ProgramData\LKBNMTFJgl\r.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exeWScript "C:\ProgramData\LKBNMTFJgl\r.vbs"4⤵
- Drops startup file
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\LKBNMTFJgl\cfgiMD5
2de48065534a637941090d8f3e04044f
SHA1eeab2c38dd711a9badb8265e11963732ea9c84db
SHA2568abf520009cea0e0c1b67563fd89c4c0e0403744942763d843e39eed180a1ed7
SHA5122d1466d5f09df4f6628092a2d7d210728536a1649cfecae362d907d61088e32574290a350848f161c67fe008b2e46864161134c63560763be932c3a631a24dc1
-
C:\ProgramData\LKBNMTFJgl\r.vbsMD5
19b2d791962e01151e4b6a40a90e8cd8
SHA1a1ee500267dd1d457b3f840f8a00ba808bb46eb3
SHA25667824e30ec5d2b61ffb266e8a37e9b929e82d507d09d21961b8293c99816c664
SHA5124d39fd8f11e86490041190f1419273c702ccd85dcc603e5d7acc9d55cc60031ef1f7cc901a2c09b46d6bdc560a4c81d464c8495e7f9e8707ec7cd999f49c49fe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\viTRMUuKeV.urlMD5
e03e6937ba1878ace3d849b233adecfe
SHA1affbb4f8b53af6cf35660b775a0a8f70fb95f8b5
SHA2569846a8975f8e2dbc96cd18d5015c03b4d8226fddf69bcb99a0610c855b0a9e6d
SHA51299ea03b8635d89409c6e65dc1dd1e995eac8c02e373f3b01faa7d715f347722075cc0d5d629914399505a2ca8ffb80bfa8cafa9d99a2e702d1fcd94fb0baeca9
-
memory/320-77-0x0000000000000000-mapping.dmp
-
memory/396-69-0x00000000000E0000-0x00000000000F4000-memory.dmpFilesize
80KB
-
memory/396-73-0x00000000001E0000-0x0000000000200000-memory.dmpFilesize
128KB
-
memory/396-67-0x0000000000A14AA0-mapping.dmp
-
memory/396-68-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/396-66-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/396-65-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/396-71-0x0000000000938000-0x0000000000A15000-memory.dmpFilesize
884KB
-
memory/396-72-0x0000000000401000-0x0000000000938000-memory.dmpFilesize
5.2MB
-
memory/396-74-0x0000000000390000-0x00000000003B0000-memory.dmpFilesize
128KB
-
memory/1424-75-0x0000000000000000-mapping.dmp
-
memory/1424-76-0x00000000001B0000-0x0000000000384000-memory.dmpFilesize
1.8MB
-
memory/2024-61-0x0000000000400000-0x00000000005D4000-memory.dmpFilesize
1.8MB
-
memory/2024-64-0x0000000000400000-0x00000000005D4000-memory.dmpFilesize
1.8MB
-
memory/2024-63-0x00000000752F1000-0x00000000752F3000-memory.dmpFilesize
8KB
-
memory/2024-62-0x0000000000404470-mapping.dmp