Analysis

  • max time kernel
    53s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    08-07-2021 08:45

General

  • Target

    sample.exe

  • Size

    4.6MB

  • MD5

    97a2004028b9687561993ed9cabc0ee4

  • SHA1

    3d35d423479b1b8a755144c30a4b347d4f915175

  • SHA256

    5ceca4728f509e3b8b58f71296472de6572c63db934b2e9c2530cae561ae608a

  • SHA512

    e0c196fd1e70d01910ea2a944ad46d7aeb87a34efc305a904ec2dde2848ce76e744beb638611c45d292c2733b7a4bcf93e76297fda80ddd2b8c9e103c35c1de0

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\._cache_sample.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_sample.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:612
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\_CACHE~1.EXE > nul
        3⤵
          PID:816
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        2⤵
        • Executes dropped EXE
        PID:1964
    • C:\Windows\SysWOW64\yykymu.exe
      C:\Windows\SysWOW64\yykymu.exe
      1⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:772
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:1880

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Bootkit

      1
      T1067

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      2
      T1082

      Query Registry

      1
      T1012

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Synaptics\Synaptics.exe
        MD5

        e1230466283011778b5ddb2c622a9beb

        SHA1

        a6e476c1821d6ee42ead730843331e0661e3bad2

        SHA256

        bf3cccf8a6099b0f5788d11d7c26532e89d03eb22f019dff9f17803508e071f1

        SHA512

        23449bb0a1fc8d6fc1db86554b07771e95a816d6299fcffbb35dd229769d261f820d0fb27b5536235b1de7364cf4701de6245b9cc47ea53ef96c42aaa0724449

      • C:\Users\Admin\AppData\Local\Temp\._cache_sample.exe
        MD5

        0c77a192f14fbf587e4f7fbf7abe03f6

        SHA1

        21373d839c4392046254d9afee6bcd4bed344db6

        SHA256

        9a3802de337c11336c8b40a7cdbbe4668eec13d86f7db7c4a8e20bd20932496d

        SHA512

        abbf7585ae9c97b40200c777ca58b9df87d0591debdacebe56f9ccc49d1cf8a56644a9771b1e719eeab285456dbabeb8963df95ee25693860006b09e8cb89c20

      • C:\Users\Admin\AppData\Local\Temp\._cache_sample.exe
        MD5

        0c77a192f14fbf587e4f7fbf7abe03f6

        SHA1

        21373d839c4392046254d9afee6bcd4bed344db6

        SHA256

        9a3802de337c11336c8b40a7cdbbe4668eec13d86f7db7c4a8e20bd20932496d

        SHA512

        abbf7585ae9c97b40200c777ca58b9df87d0591debdacebe56f9ccc49d1cf8a56644a9771b1e719eeab285456dbabeb8963df95ee25693860006b09e8cb89c20

      • C:\Windows\SysWOW64\yykymu.exe
        MD5

        0c77a192f14fbf587e4f7fbf7abe03f6

        SHA1

        21373d839c4392046254d9afee6bcd4bed344db6

        SHA256

        9a3802de337c11336c8b40a7cdbbe4668eec13d86f7db7c4a8e20bd20932496d

        SHA512

        abbf7585ae9c97b40200c777ca58b9df87d0591debdacebe56f9ccc49d1cf8a56644a9771b1e719eeab285456dbabeb8963df95ee25693860006b09e8cb89c20

      • C:\Windows\SysWOW64\yykymu.exe
        MD5

        0c77a192f14fbf587e4f7fbf7abe03f6

        SHA1

        21373d839c4392046254d9afee6bcd4bed344db6

        SHA256

        9a3802de337c11336c8b40a7cdbbe4668eec13d86f7db7c4a8e20bd20932496d

        SHA512

        abbf7585ae9c97b40200c777ca58b9df87d0591debdacebe56f9ccc49d1cf8a56644a9771b1e719eeab285456dbabeb8963df95ee25693860006b09e8cb89c20

      • \ProgramData\Synaptics\Synaptics.exe
        MD5

        e1230466283011778b5ddb2c622a9beb

        SHA1

        a6e476c1821d6ee42ead730843331e0661e3bad2

        SHA256

        bf3cccf8a6099b0f5788d11d7c26532e89d03eb22f019dff9f17803508e071f1

        SHA512

        23449bb0a1fc8d6fc1db86554b07771e95a816d6299fcffbb35dd229769d261f820d0fb27b5536235b1de7364cf4701de6245b9cc47ea53ef96c42aaa0724449

      • \ProgramData\Synaptics\Synaptics.exe
        MD5

        e1230466283011778b5ddb2c622a9beb

        SHA1

        a6e476c1821d6ee42ead730843331e0661e3bad2

        SHA256

        bf3cccf8a6099b0f5788d11d7c26532e89d03eb22f019dff9f17803508e071f1

        SHA512

        23449bb0a1fc8d6fc1db86554b07771e95a816d6299fcffbb35dd229769d261f820d0fb27b5536235b1de7364cf4701de6245b9cc47ea53ef96c42aaa0724449

      • \Users\Admin\AppData\Local\Temp\._cache_sample.exe
        MD5

        0c77a192f14fbf587e4f7fbf7abe03f6

        SHA1

        21373d839c4392046254d9afee6bcd4bed344db6

        SHA256

        9a3802de337c11336c8b40a7cdbbe4668eec13d86f7db7c4a8e20bd20932496d

        SHA512

        abbf7585ae9c97b40200c777ca58b9df87d0591debdacebe56f9ccc49d1cf8a56644a9771b1e719eeab285456dbabeb8963df95ee25693860006b09e8cb89c20

      • memory/612-80-0x0000000002930000-0x0000000002A41000-memory.dmp
        Filesize

        1.1MB

      • memory/612-81-0x0000000002A50000-0x0000000002B51000-memory.dmp
        Filesize

        1.0MB

      • memory/612-73-0x0000000075FB0000-0x0000000075FF7000-memory.dmp
        Filesize

        284KB

      • memory/612-76-0x00000000760A0000-0x0000000076140000-memory.dmp
        Filesize

        640KB

      • memory/612-77-0x0000000002440000-0x0000000002489000-memory.dmp
        Filesize

        292KB

      • memory/612-62-0x0000000000000000-mapping.dmp
      • memory/612-82-0x0000000010000000-0x000000001002B000-memory.dmp
        Filesize

        172KB

      • memory/612-78-0x0000000002600000-0x0000000002781000-memory.dmp
        Filesize

        1.5MB

      • memory/772-95-0x00000000028F0000-0x0000000002A01000-memory.dmp
        Filesize

        1.1MB

      • memory/772-88-0x0000000075FB0000-0x0000000075FF7000-memory.dmp
        Filesize

        284KB

      • memory/772-91-0x00000000760A0000-0x0000000076140000-memory.dmp
        Filesize

        640KB

      • memory/772-92-0x0000000002430000-0x0000000002479000-memory.dmp
        Filesize

        292KB

      • memory/772-93-0x0000000002640000-0x00000000027C1000-memory.dmp
        Filesize

        1.5MB

      • memory/772-96-0x0000000002A10000-0x0000000002B11000-memory.dmp
        Filesize

        1.0MB

      • memory/816-100-0x0000000000000000-mapping.dmp
      • memory/1724-60-0x0000000075161000-0x0000000075163000-memory.dmp
        Filesize

        8KB

      • memory/1724-65-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/1880-101-0x000007FEFB571000-0x000007FEFB573000-memory.dmp
        Filesize

        8KB

      • memory/1880-102-0x00000000027C0000-0x00000000027C1000-memory.dmp
        Filesize

        4KB

      • memory/1964-68-0x0000000000000000-mapping.dmp
      • memory/1964-71-0x0000000000220000-0x0000000000221000-memory.dmp
        Filesize

        4KB