Analysis
-
max time kernel
61s -
max time network
156s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
23-07-2021 18:36
Behavioral task
behavioral1
Sample
Xminer.exe
Resource
win7v20210408
General
-
Target
Xminer.exe
-
Size
5.7MB
-
MD5
562db3d1e91f2ab1aaf3929e52dba6df
-
SHA1
340daf78c5507221dd25af4dc899b3ef84bbea90
-
SHA256
9b2a0965ba90251f7cb553480e2844e98496aa5e0cb5df5c9331507a30fb0b6c
-
SHA512
cb18a33b65eaff6afd87428633c933fedfb90f6210c625e91dd5acda4e2c1906ffdf17b7d7cfbe4562b139562072288561256c8f74cc4111ce744e2b4afe6f83
Malware Config
Signatures
-
XMRig Miner Payload 3 IoCs
Processes:
resource yara_rule \ProgramData\OneDrive\OneDrive.exe xmrig C:\ProgramData\OneDrive\OneDrive.exe xmrig C:\ProgramData\OneDrive\OneDrive.exe xmrig -
Executes dropped EXE 2 IoCs
Processes:
OneDrive.exeOneDrive.exepid process 1768 OneDrive.exe 1328 OneDrive.exe -
Drops startup file 1 IoCs
Processes:
Xminer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.lnk Xminer.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1772 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
OneDrive.exeOneDrive.exedescription pid process Token: SeLockMemoryPrivilege 1768 OneDrive.exe Token: SeLockMemoryPrivilege 1768 OneDrive.exe Token: SeLockMemoryPrivilege 1328 OneDrive.exe Token: SeLockMemoryPrivilege 1328 OneDrive.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Xminer.exepid process 1036 Xminer.exe 1036 Xminer.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Xminer.exepid process 1036 Xminer.exe 1036 Xminer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Xminer.execmd.exeWScript.execmd.exeWScript.execmd.exedescription pid process target process PID 1036 wrote to memory of 1968 1036 Xminer.exe cmd.exe PID 1036 wrote to memory of 1968 1036 Xminer.exe cmd.exe PID 1036 wrote to memory of 1968 1036 Xminer.exe cmd.exe PID 1968 wrote to memory of 1388 1968 cmd.exe WScript.exe PID 1968 wrote to memory of 1388 1968 cmd.exe WScript.exe PID 1968 wrote to memory of 1388 1968 cmd.exe WScript.exe PID 1388 wrote to memory of 1772 1388 WScript.exe cmd.exe PID 1388 wrote to memory of 1772 1388 WScript.exe cmd.exe PID 1388 wrote to memory of 1772 1388 WScript.exe cmd.exe PID 1968 wrote to memory of 1776 1968 cmd.exe WScript.exe PID 1968 wrote to memory of 1776 1968 cmd.exe WScript.exe PID 1968 wrote to memory of 1776 1968 cmd.exe WScript.exe PID 1772 wrote to memory of 1768 1772 cmd.exe OneDrive.exe PID 1772 wrote to memory of 1768 1772 cmd.exe OneDrive.exe PID 1772 wrote to memory of 1768 1772 cmd.exe OneDrive.exe PID 1776 wrote to memory of 1248 1776 WScript.exe cmd.exe PID 1776 wrote to memory of 1248 1776 WScript.exe cmd.exe PID 1776 wrote to memory of 1248 1776 WScript.exe cmd.exe PID 1248 wrote to memory of 1328 1248 cmd.exe OneDrive.exe PID 1248 wrote to memory of 1328 1248 cmd.exe OneDrive.exe PID 1248 wrote to memory of 1328 1248 cmd.exe OneDrive.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xminer.exe"C:\Users\Admin\AppData\Local\Temp\Xminer.exe"1⤵
- Drops startup file
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ""C:\ProgramData\OneDrive\bat.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\OneDrive\Hide.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.execmd /c ""C:\ProgramData\OneDrive\start.cmd" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\OneDrive\OneDrive.exeOneDrive.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\OneDrive\Hide.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.execmd /c ""C:\ProgramData\OneDrive\start.cmd" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\OneDrive\OneDrive.exeOneDrive.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\OneDrive\Hide.vbsMD5
9d3e53a45a2a66903b60df0da9c43204
SHA1155d4626973b7c5263a74d7d3ddda4b7f9f41a5f
SHA256810f546dd3db6b16cedb00e725443bbfea6193533633a905bad53e76c92c3a5c
SHA51263b48df98b489907df4e92ece7bc50d48867d74dd6bce485a2c708bf9cd7f1bbd797fb287e4b17cf92d87b8b2d4d04b75c2317a200f33903dc36822672cc8efc
-
C:\ProgramData\OneDrive\OneDrive.exeMD5
7e747dc3069cd41f41e95fe241ad3fe3
SHA1b0c4fec61662662f4a436ab0021d10f9c2fa72da
SHA2563efa2b3639c8c357edee22cf6ddcf47b4be0631c3abdd6fe5eb119eff31fef41
SHA51208d14dfc8f98cf917e61935afaec56389705b17abf0f40f07cf8ffcdb34c60c45b2064d27bf70ffb5073a87021e13e5fd3b6cd22bdaa3ff0bf01baa2f19ff5e8
-
C:\ProgramData\OneDrive\OneDrive.exeMD5
7e747dc3069cd41f41e95fe241ad3fe3
SHA1b0c4fec61662662f4a436ab0021d10f9c2fa72da
SHA2563efa2b3639c8c357edee22cf6ddcf47b4be0631c3abdd6fe5eb119eff31fef41
SHA51208d14dfc8f98cf917e61935afaec56389705b17abf0f40f07cf8ffcdb34c60c45b2064d27bf70ffb5073a87021e13e5fd3b6cd22bdaa3ff0bf01baa2f19ff5e8
-
C:\ProgramData\OneDrive\bat.batMD5
58cc6845de149329e70735ddfeb15929
SHA105e988b00c98ac78a51799f42a440e6deee8b57f
SHA2566af13cac95660c368b511f827ed20214028499cc8b39fad60df42526fcd1bf64
SHA512d0adf5eb00047bcb8a429a69ba89fc2b78b907af779a46d99d464398c1efc8081f7d40c83f0312406a7d4d391af58ad1e2dd38d6cb96e94a6be91d5539edd43e
-
C:\ProgramData\OneDrive\config.jsonMD5
b6391bd3c1f12cc1a7d0e9340ac64163
SHA11be90c7983362dd2efd83b6f9a2f36a23788cb38
SHA25641e8a2598eb0929655feb8ad6eeffd5e3f762368557f361b37e296ce9586c13c
SHA5121034825bad67098ca4c1e5b7040cfba008fd3e7a28cf47261fc891ce15c04c6d4d45b297215c0f34f932c13536e003702aa9c3f148e50fcdcbc45b7cc3851bca
-
C:\ProgramData\OneDrive\start.cmdMD5
e59c417c96b0fece601eed82898106ce
SHA1d962291aa061ac1a26290f8eaae617c2a0bd538b
SHA2562ceb591c8490c88f3519a156dc4fb7c9dd1423bd19e77f03116613a06c86e307
SHA5126a8bff6b11a3a2f5d75bfc4cf00d3d0e48f777f983c927493cc79a9ffa00f24d078903c833cb2833d1c5c0d09316927243343a689aa7ae559fa0a8d961fb9b90
-
\ProgramData\OneDrive\OneDrive.exeMD5
7e747dc3069cd41f41e95fe241ad3fe3
SHA1b0c4fec61662662f4a436ab0021d10f9c2fa72da
SHA2563efa2b3639c8c357edee22cf6ddcf47b4be0631c3abdd6fe5eb119eff31fef41
SHA51208d14dfc8f98cf917e61935afaec56389705b17abf0f40f07cf8ffcdb34c60c45b2064d27bf70ffb5073a87021e13e5fd3b6cd22bdaa3ff0bf01baa2f19ff5e8
-
memory/1036-60-0x000007FEFB701000-0x000007FEFB703000-memory.dmpFilesize
8KB
-
memory/1248-76-0x0000000000000000-mapping.dmp
-
memory/1328-82-0x0000000001D30000-0x0000000001D50000-memory.dmpFilesize
128KB
-
memory/1328-77-0x0000000000000000-mapping.dmp
-
memory/1328-81-0x0000000001D10000-0x0000000001D30000-memory.dmpFilesize
128KB
-
memory/1328-80-0x00000000005B0000-0x00000000005D0000-memory.dmpFilesize
128KB
-
memory/1388-65-0x0000000000000000-mapping.dmp
-
memory/1768-73-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1768-71-0x0000000000000000-mapping.dmp
-
memory/1768-83-0x0000000002100000-0x0000000002120000-memory.dmpFilesize
128KB
-
memory/1768-84-0x0000000002120000-0x0000000002140000-memory.dmpFilesize
128KB
-
memory/1768-85-0x0000000002140000-0x0000000002160000-memory.dmpFilesize
128KB
-
memory/1772-68-0x0000000000000000-mapping.dmp
-
memory/1776-69-0x0000000000000000-mapping.dmp
-
memory/1968-61-0x0000000000000000-mapping.dmp