Analysis

  • max time kernel
    114s
  • max time network
    115s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    13-05-2021 12:57

General

  • Target

    423eb3ee1dca6dac105f68812619c8d77643dbb0d082ae24ef7fc42b93d3e843.exe

  • Size

    3.4MB

  • MD5

    b8686eb397b6f0cdafce7ae4cc3927d9

  • SHA1

    cf2e6c163ec592095941d95e7e1fffa2d556b114

  • SHA256

    423eb3ee1dca6dac105f68812619c8d77643dbb0d082ae24ef7fc42b93d3e843

  • SHA512

    adac4ebddaa99f1bf2444cc4d160cbf4e6eaff8397c15017cc9f444e05985c03a5fa1bf5ed0068d0af5f31aa82a37d968635cc4a8cf81016967d0409297c5431

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\423eb3ee1dca6dac105f68812619c8d77643dbb0d082ae24ef7fc42b93d3e843.exe
    "C:\Users\Admin\AppData\Local\Temp\423eb3ee1dca6dac105f68812619c8d77643dbb0d082ae24ef7fc42b93d3e843.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3872
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:3552

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat
      MD5

      e5c16518d9bc9565a3c2074170a04490

      SHA1

      db97d2ae53737f43badcfb298c6eb2952c22b4ff

      SHA256

      7ed516ddd607ef5f3c6e5a4294143f36cacdda0b004e8e949075e6981617f0e9

      SHA512

      864285ee2ee2a734b5a04a64a7ba7d74686334ff9d66b843f287fd4a9502daf7e4c19ac55cfefdc31d1b1c264b60d7f83d27da3a330795d4583ff78c99c87bd6

    • memory/3552-114-0x0000000000000000-mapping.dmp