General

  • Target

    Chew-WGA.exe

  • Size

    9.5MB

  • Sample

    210703-spl55mp4ps

  • MD5

    f5572fab554c3118764c69848f8ac7a8

  • SHA1

    c5b6bdbc4b50f5bb11c0093cfc86047d78b52ffc

  • SHA256

    e5f52a7867ca71f20a366648795bae578f202104e077a94490c8e3771b35423a

  • SHA512

    7c80181733032764c6c252248076be536082ff74780a850ed6d93a27b1bc6ee72ade08977471ccd4d91332e2796cca0213f1ed4a2caf68816f4eb92cd312d9f5

Malware Config

Targets

    • Target

      Chew-WGA.exe

    • Size

      9.5MB

    • MD5

      f5572fab554c3118764c69848f8ac7a8

    • SHA1

      c5b6bdbc4b50f5bb11c0093cfc86047d78b52ffc

    • SHA256

      e5f52a7867ca71f20a366648795bae578f202104e077a94490c8e3771b35423a

    • SHA512

      7c80181733032764c6c252248076be536082ff74780a850ed6d93a27b1bc6ee72ade08977471ccd4d91332e2796cca0213f1ed4a2caf68816f4eb92cd312d9f5

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks