Analysis

  • max time kernel
    36s
  • max time network
    46s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    13-05-2021 13:40

General

  • Target

    4cbf447acf3d4b9e14dec09654effa49edb6ff7e1b539f5dd122dcd57584fa72.exe

  • Size

    37KB

  • MD5

    b84027fc912f24bcc662f1a7ec6dcc22

  • SHA1

    12c13de5d53e28fc158245558f914aa41384708d

  • SHA256

    4cbf447acf3d4b9e14dec09654effa49edb6ff7e1b539f5dd122dcd57584fa72

  • SHA512

    0156a723048c314988b27d65cb5990655d261b3dc12a0e25d6b4695e18a7879fce20051ae393b85cbf5316c06502354c248291d7b8ec219b8ef9c34b8aa05abe

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cbf447acf3d4b9e14dec09654effa49edb6ff7e1b539f5dd122dcd57584fa72.exe
    "C:\Users\Admin\AppData\Local\Temp\4cbf447acf3d4b9e14dec09654effa49edb6ff7e1b539f5dd122dcd57584fa72.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:996
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 468
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3604

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/996-114-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB