Analysis

  • max time kernel
    112s
  • max time network
    14s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    16-05-2021 00:22

General

  • Target

    355d63445d88a149580b8fd8e1e0fb4880561df601749683b86f2d6dbea12f65.exe

  • Size

    1.7MB

  • MD5

    e6703b7f7fe55988a33baf75b7ccbc9e

  • SHA1

    858337941efaa33dd18f589bd641633e66f2691f

  • SHA256

    355d63445d88a149580b8fd8e1e0fb4880561df601749683b86f2d6dbea12f65

  • SHA512

    3a1881087a11dfe16d80a8fd0746df631da3067059f37f396f26be754e968cbef53fd4f791fdfbda3f0e9813cf790e4f3c3aacc84d2b4803c674455e528c3a84

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 17 IoCs
  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\355d63445d88a149580b8fd8e1e0fb4880561df601749683b86f2d6dbea12f65.exe
    "C:\Users\Admin\AppData\Local\Temp\355d63445d88a149580b8fd8e1e0fb4880561df601749683b86f2d6dbea12f65.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Quick Memory Editor.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Quick Memory Editor.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Users\Admin\AppData\Local\Temp\is-38HVR.tmp\is-EJCIV.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-38HVR.tmp\is-EJCIV.tmp" /SL4 $600C6 "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Quick Memory Editor.exe" 1266676 51200
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: GetForegroundWindowSpam
          PID:740
      • C:\Windows\SysWOW64\MuTocDo.exe
        C:\Windows\system32\MuTocDo.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 204
          4⤵
          • Loads dropped DLL
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:112

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\MuTocDo.exe
    MD5

    d808151a9d15ead954ce0ba85caa1601

    SHA1

    e02684499decdc07f11bfdefd1a51df3c0575695

    SHA256

    a975ed900c3b05d55d721811ed386f6360e8b7b08e288d17a0f8c54c43e65945

    SHA512

    dde117bcc5b8400887d66563e52758daec4624cf9a1f23fa81595a38028f8a8264837e0753c37e7f3f1fa52f5e54584880e2647d8edf708e5d4ca38d81fcc0ba

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\MuTocDohk.dll
    MD5

    c74af3962a596f0672af849990d5d24a

    SHA1

    b4e0b9682cf5f6c6fd457ee1283fed7b8c6db903

    SHA256

    721e30274c8ae6d80c71a839547654c984d9110b7476236ffabde33af7455262

    SHA512

    ccc3996b63ee0df2e2de003f2bdc25f9ea23aa5f591fecd38eda683e37a2144cbfcd181eac6483d10fe93aa28355554b1a6709edae3c91203ec0e86a5510c004

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\MuTocDowb.dll
    MD5

    2c10192a52c6e73c934da6643acbf231

    SHA1

    75f1fc4ceeeb87704b91de6be2f099dcdbdf490e

    SHA256

    51ea1f80c9fd256c8f8fa059c45fb52b1217cf0b72374cc2ad0f1bec4d88e066

    SHA512

    dfb6ce404cfcbd3ab3c2a2c82f4777affad56c307b5ef6e984e44b4a4a802f05b800535c177da4fe2051c3a125757fb9c5a9e68f180f6ef1b2f9d4246db72b45

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Quick Memory Editor.exe
    MD5

    bd792ebae2b88bb79573e375c5489f11

    SHA1

    55034bd3a34d83815cb0172e12a75487b3c5ee5c

    SHA256

    50c3b30f64994eef8d1c3db0b50933695a02c8e858b0caa11167bf0ca5534233

    SHA512

    93709ade3c02c90a7dc9c989371b7a71ba4b015f0583eadcee59796eb96c1d6e5354a721464965ba8885b134d958a382168a417ccb9cbe3923809b7d251ad1f8

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Quick Memory Editor.exe
    MD5

    bd792ebae2b88bb79573e375c5489f11

    SHA1

    55034bd3a34d83815cb0172e12a75487b3c5ee5c

    SHA256

    50c3b30f64994eef8d1c3db0b50933695a02c8e858b0caa11167bf0ca5534233

    SHA512

    93709ade3c02c90a7dc9c989371b7a71ba4b015f0583eadcee59796eb96c1d6e5354a721464965ba8885b134d958a382168a417ccb9cbe3923809b7d251ad1f8

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\inst.dat
    MD5

    5d808dbd407059cdea502cc6668411a0

    SHA1

    ef2d95869948238c337259b399346462a400e135

    SHA256

    736e4019a5a6f40e0f6213299e4dd1756d1e0da2fc09803f6032707fea7ad11f

    SHA512

    a1503ae91cf1a0de34012bdf76d8608dc63b65101af3157dc0f9923a3a00467228d2fdd1897200a41ed6b526ee2dc99ec4a9b17126ec53c4743cfd48ccb95dfa

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pk.bin
    MD5

    6580b60a9238d8848100363260b4fbe3

    SHA1

    d6bea8745c487b9f86e8c1528c6ceb77fd23738e

    SHA256

    fb803f9a729de43e5620b69740b95e7664b5789a4dd646a2c9bf1795bc42fd81

    SHA512

    24dbfae634be549c7f265d1e538740340ab73e68cd8d73d4b6bb4202ffaead35e6ffb7c128f52d486e92b11e8bcaaedb05d0a37e562e672b44ea44714cec48db

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
    MD5

    a455ca431e66975d886f1a8cfee8cb9f

    SHA1

    95868529973c77199b76ec593a686d9b324dee8b

    SHA256

    6bba0b8d8bf03ba15828c53e72d83d766e44b3238b55ab75348d8ce93bfd0056

    SHA512

    53e0c4edf9d91ebdea04bfb343c568190eaaeb066bc6742262f1e5943d2b27c375e1eca483419ae8753138dc2131c9d3c7742812c16863689c3bb266057c0531

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
    MD5

    a455ca431e66975d886f1a8cfee8cb9f

    SHA1

    95868529973c77199b76ec593a686d9b324dee8b

    SHA256

    6bba0b8d8bf03ba15828c53e72d83d766e44b3238b55ab75348d8ce93bfd0056

    SHA512

    53e0c4edf9d91ebdea04bfb343c568190eaaeb066bc6742262f1e5943d2b27c375e1eca483419ae8753138dc2131c9d3c7742812c16863689c3bb266057c0531

  • C:\Users\Admin\AppData\Local\Temp\is-38HVR.tmp\is-EJCIV.tmp
    MD5

    365e4b9988123eef3955a4fb28a9be93

    SHA1

    f2eacd886960eca81ba4c1e1e82f9e70711c296d

    SHA256

    cc85b7b90d427ca6f3b4c25593368bce1337eb475207aeed1ae2f9721b2370f9

    SHA512

    07f90c47216af13b0c059a08e226e3cf3de452f562fb40778195ce82344f6d2e17adc2a3456f618e508fcf1add5348685171ee7c0ec3fefdff327633e63b2991

  • C:\Users\Admin\AppData\Local\Temp\is-38HVR.tmp\is-EJCIV.tmp
    MD5

    365e4b9988123eef3955a4fb28a9be93

    SHA1

    f2eacd886960eca81ba4c1e1e82f9e70711c296d

    SHA256

    cc85b7b90d427ca6f3b4c25593368bce1337eb475207aeed1ae2f9721b2370f9

    SHA512

    07f90c47216af13b0c059a08e226e3cf3de452f562fb40778195ce82344f6d2e17adc2a3456f618e508fcf1add5348685171ee7c0ec3fefdff327633e63b2991

  • C:\Windows\SysWOW64\MuTocDo.exe
    MD5

    4766ffb9e69c601f0cce8894d6f4b59b

    SHA1

    49aedb5e5b6a99bb3f8d0d6229315b794a1240bd

    SHA256

    1cb01749949f22cffb09a69ba3c913595df2d1bb000dca1fd0cd7fd9d4eacb96

    SHA512

    a2302b69f0a283d2499e50252e3d939d69c864bc9601d8f0166ae1f3fd22f18a9d67df10c1f2d4dccec6a6602f272cb152b339d26fadcb67cb6bd04c6b7a8500

  • C:\Windows\SysWOW64\MuTocDo.exe
    MD5

    4766ffb9e69c601f0cce8894d6f4b59b

    SHA1

    49aedb5e5b6a99bb3f8d0d6229315b794a1240bd

    SHA256

    1cb01749949f22cffb09a69ba3c913595df2d1bb000dca1fd0cd7fd9d4eacb96

    SHA512

    a2302b69f0a283d2499e50252e3d939d69c864bc9601d8f0166ae1f3fd22f18a9d67df10c1f2d4dccec6a6602f272cb152b339d26fadcb67cb6bd04c6b7a8500

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Quick Memory Editor.exe
    MD5

    bd792ebae2b88bb79573e375c5489f11

    SHA1

    55034bd3a34d83815cb0172e12a75487b3c5ee5c

    SHA256

    50c3b30f64994eef8d1c3db0b50933695a02c8e858b0caa11167bf0ca5534233

    SHA512

    93709ade3c02c90a7dc9c989371b7a71ba4b015f0583eadcee59796eb96c1d6e5354a721464965ba8885b134d958a382168a417ccb9cbe3923809b7d251ad1f8

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Quick Memory Editor.exe
    MD5

    bd792ebae2b88bb79573e375c5489f11

    SHA1

    55034bd3a34d83815cb0172e12a75487b3c5ee5c

    SHA256

    50c3b30f64994eef8d1c3db0b50933695a02c8e858b0caa11167bf0ca5534233

    SHA512

    93709ade3c02c90a7dc9c989371b7a71ba4b015f0583eadcee59796eb96c1d6e5354a721464965ba8885b134d958a382168a417ccb9cbe3923809b7d251ad1f8

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Quick Memory Editor.exe
    MD5

    bd792ebae2b88bb79573e375c5489f11

    SHA1

    55034bd3a34d83815cb0172e12a75487b3c5ee5c

    SHA256

    50c3b30f64994eef8d1c3db0b50933695a02c8e858b0caa11167bf0ca5534233

    SHA512

    93709ade3c02c90a7dc9c989371b7a71ba4b015f0583eadcee59796eb96c1d6e5354a721464965ba8885b134d958a382168a417ccb9cbe3923809b7d251ad1f8

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Quick Memory Editor.exe
    MD5

    bd792ebae2b88bb79573e375c5489f11

    SHA1

    55034bd3a34d83815cb0172e12a75487b3c5ee5c

    SHA256

    50c3b30f64994eef8d1c3db0b50933695a02c8e858b0caa11167bf0ca5534233

    SHA512

    93709ade3c02c90a7dc9c989371b7a71ba4b015f0583eadcee59796eb96c1d6e5354a721464965ba8885b134d958a382168a417ccb9cbe3923809b7d251ad1f8

  • \Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
    MD5

    a455ca431e66975d886f1a8cfee8cb9f

    SHA1

    95868529973c77199b76ec593a686d9b324dee8b

    SHA256

    6bba0b8d8bf03ba15828c53e72d83d766e44b3238b55ab75348d8ce93bfd0056

    SHA512

    53e0c4edf9d91ebdea04bfb343c568190eaaeb066bc6742262f1e5943d2b27c375e1eca483419ae8753138dc2131c9d3c7742812c16863689c3bb266057c0531

  • \Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
    MD5

    a455ca431e66975d886f1a8cfee8cb9f

    SHA1

    95868529973c77199b76ec593a686d9b324dee8b

    SHA256

    6bba0b8d8bf03ba15828c53e72d83d766e44b3238b55ab75348d8ce93bfd0056

    SHA512

    53e0c4edf9d91ebdea04bfb343c568190eaaeb066bc6742262f1e5943d2b27c375e1eca483419ae8753138dc2131c9d3c7742812c16863689c3bb266057c0531

  • \Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
    MD5

    a455ca431e66975d886f1a8cfee8cb9f

    SHA1

    95868529973c77199b76ec593a686d9b324dee8b

    SHA256

    6bba0b8d8bf03ba15828c53e72d83d766e44b3238b55ab75348d8ce93bfd0056

    SHA512

    53e0c4edf9d91ebdea04bfb343c568190eaaeb066bc6742262f1e5943d2b27c375e1eca483419ae8753138dc2131c9d3c7742812c16863689c3bb266057c0531

  • \Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
    MD5

    a455ca431e66975d886f1a8cfee8cb9f

    SHA1

    95868529973c77199b76ec593a686d9b324dee8b

    SHA256

    6bba0b8d8bf03ba15828c53e72d83d766e44b3238b55ab75348d8ce93bfd0056

    SHA512

    53e0c4edf9d91ebdea04bfb343c568190eaaeb066bc6742262f1e5943d2b27c375e1eca483419ae8753138dc2131c9d3c7742812c16863689c3bb266057c0531

  • \Users\Admin\AppData\Local\Temp\is-38HVR.tmp\is-EJCIV.tmp
    MD5

    365e4b9988123eef3955a4fb28a9be93

    SHA1

    f2eacd886960eca81ba4c1e1e82f9e70711c296d

    SHA256

    cc85b7b90d427ca6f3b4c25593368bce1337eb475207aeed1ae2f9721b2370f9

    SHA512

    07f90c47216af13b0c059a08e226e3cf3de452f562fb40778195ce82344f6d2e17adc2a3456f618e508fcf1add5348685171ee7c0ec3fefdff327633e63b2991

  • \Users\Admin\AppData\Local\Temp\is-SMAM9.tmp\_shfoldr.dll
    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-SMAM9.tmp\_shfoldr.dll
    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Windows\SysWOW64\MuTocDo.exe
    MD5

    4766ffb9e69c601f0cce8894d6f4b59b

    SHA1

    49aedb5e5b6a99bb3f8d0d6229315b794a1240bd

    SHA256

    1cb01749949f22cffb09a69ba3c913595df2d1bb000dca1fd0cd7fd9d4eacb96

    SHA512

    a2302b69f0a283d2499e50252e3d939d69c864bc9601d8f0166ae1f3fd22f18a9d67df10c1f2d4dccec6a6602f272cb152b339d26fadcb67cb6bd04c6b7a8500

  • \Windows\SysWOW64\MuTocDo.exe
    MD5

    4766ffb9e69c601f0cce8894d6f4b59b

    SHA1

    49aedb5e5b6a99bb3f8d0d6229315b794a1240bd

    SHA256

    1cb01749949f22cffb09a69ba3c913595df2d1bb000dca1fd0cd7fd9d4eacb96

    SHA512

    a2302b69f0a283d2499e50252e3d939d69c864bc9601d8f0166ae1f3fd22f18a9d67df10c1f2d4dccec6a6602f272cb152b339d26fadcb67cb6bd04c6b7a8500

  • \Windows\SysWOW64\MuTocDo.exe
    MD5

    4766ffb9e69c601f0cce8894d6f4b59b

    SHA1

    49aedb5e5b6a99bb3f8d0d6229315b794a1240bd

    SHA256

    1cb01749949f22cffb09a69ba3c913595df2d1bb000dca1fd0cd7fd9d4eacb96

    SHA512

    a2302b69f0a283d2499e50252e3d939d69c864bc9601d8f0166ae1f3fd22f18a9d67df10c1f2d4dccec6a6602f272cb152b339d26fadcb67cb6bd04c6b7a8500

  • \Windows\SysWOW64\MuTocDo.exe
    MD5

    4766ffb9e69c601f0cce8894d6f4b59b

    SHA1

    49aedb5e5b6a99bb3f8d0d6229315b794a1240bd

    SHA256

    1cb01749949f22cffb09a69ba3c913595df2d1bb000dca1fd0cd7fd9d4eacb96

    SHA512

    a2302b69f0a283d2499e50252e3d939d69c864bc9601d8f0166ae1f3fd22f18a9d67df10c1f2d4dccec6a6602f272cb152b339d26fadcb67cb6bd04c6b7a8500

  • \Windows\SysWOW64\MuTocDo.exe
    MD5

    4766ffb9e69c601f0cce8894d6f4b59b

    SHA1

    49aedb5e5b6a99bb3f8d0d6229315b794a1240bd

    SHA256

    1cb01749949f22cffb09a69ba3c913595df2d1bb000dca1fd0cd7fd9d4eacb96

    SHA512

    a2302b69f0a283d2499e50252e3d939d69c864bc9601d8f0166ae1f3fd22f18a9d67df10c1f2d4dccec6a6602f272cb152b339d26fadcb67cb6bd04c6b7a8500

  • \Windows\SysWOW64\MuTocDo.exe
    MD5

    4766ffb9e69c601f0cce8894d6f4b59b

    SHA1

    49aedb5e5b6a99bb3f8d0d6229315b794a1240bd

    SHA256

    1cb01749949f22cffb09a69ba3c913595df2d1bb000dca1fd0cd7fd9d4eacb96

    SHA512

    a2302b69f0a283d2499e50252e3d939d69c864bc9601d8f0166ae1f3fd22f18a9d67df10c1f2d4dccec6a6602f272cb152b339d26fadcb67cb6bd04c6b7a8500

  • memory/112-91-0x0000000000000000-mapping.dmp
  • memory/112-102-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/740-88-0x0000000000000000-mapping.dmp
  • memory/740-100-0x0000000000260000-0x0000000000261000-memory.dmp
    Filesize

    4KB

  • memory/1724-80-0x0000000000000000-mapping.dmp
  • memory/1728-70-0x0000000000000000-mapping.dmp
  • memory/1728-85-0x0000000000400000-0x0000000000413000-memory.dmp
    Filesize

    76KB

  • memory/1996-64-0x0000000000000000-mapping.dmp
  • memory/2020-59-0x0000000076281000-0x0000000076283000-memory.dmp
    Filesize

    8KB