Analysis

  • max time kernel
    142s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    10-09-2021 05:02

General

  • Target

    ef84d3be_N468biLDu1.exe

  • Size

    104KB

  • MD5

    ef84d3be5dceecc53116942e3d1e3bc1

  • SHA1

    4fef8e0a14cb2e80f796fc34e1db65c3d061859f

  • SHA256

    ff75a4f5148614f8c1ef4c86f8d0febf4a1ac1e8d34bb51bb14d5e4fef28cc2d

  • SHA512

    feb064f9b579a10899d61fde1f68b50e22069bee535f898c435aca52be317cf11f4f0019c86b4f6fa3350bd5b312f2f7e6740357102e8317b42256706c43ff32

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef84d3be_N468biLDu1.exe
    "C:\Users\Admin\AppData\Local\Temp\ef84d3be_N468biLDu1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Users\Admin\AppData\Local\Temp\fl.exe
      "C:\Users\Admin\AppData\Local\Temp\fl.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2268
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2076
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:840
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1652
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3444
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\fl.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:344
        • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
          C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\fl.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3508
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "tllhost" /tr '"C:\Windows\system32\tllhost.exe"' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:900
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "tllhost" /tr '"C:\Windows\system32\tllhost.exe"'
              6⤵
              • Creates scheduled task(s)
              PID:3644
          • C:\Windows\system32\tllhost.exe
            "C:\Windows\system32\tllhost.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:200
            • C:\Windows\system32\cmd.exe
              "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3676
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1972
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:972
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:188
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4016
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\tllhost.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1284
              • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
                C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\tllhost.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2408
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "tllhost" /tr '"C:\Windows\system32\tllhost.exe"' & exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3244
                  • C:\Windows\system32\schtasks.exe
                    schtasks /create /f /sc onlogon /rl highest /tn "tllhost" /tr '"C:\Windows\system32\tllhost.exe"'
                    9⤵
                    • Creates scheduled task(s)
                    PID:3328
                • C:\Windows\system32\Microsoft\Telemetry\sihost32.exe
                  "C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:2112
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2300
                  • C:\Windows\system32\choice.exe
                    choice /C Y /N /D Y /T 3
                    9⤵
                      PID:1676
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3304
              • C:\Windows\system32\choice.exe
                choice /C Y /N /D Y /T 3
                6⤵
                  PID:2784

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/188-459-0x000001C4296F8000-0x000001C4296F9000-memory.dmp

        Filesize

        4KB

      • memory/188-457-0x000001C4296F6000-0x000001C4296F8000-memory.dmp

        Filesize

        8KB

      • memory/188-421-0x000001C4296F3000-0x000001C4296F5000-memory.dmp

        Filesize

        8KB

      • memory/188-420-0x000001C4296F0000-0x000001C4296F2000-memory.dmp

        Filesize

        8KB

      • memory/200-328-0x000000001C4C0000-0x000000001C4C2000-memory.dmp

        Filesize

        8KB

      • memory/656-123-0x0000000007240000-0x0000000007241000-memory.dmp

        Filesize

        4KB

      • memory/656-124-0x0000000006A60000-0x0000000006A61000-memory.dmp

        Filesize

        4KB

      • memory/656-125-0x0000000006EB0000-0x0000000006EB1000-memory.dmp

        Filesize

        4KB

      • memory/656-126-0x0000000007C70000-0x0000000007C71000-memory.dmp

        Filesize

        4KB

      • memory/656-122-0x0000000006B40000-0x0000000006B41000-memory.dmp

        Filesize

        4KB

      • memory/656-114-0x00000000008C0000-0x00000000008C1000-memory.dmp

        Filesize

        4KB

      • memory/656-121-0x00000000051A0000-0x00000000051A1000-memory.dmp

        Filesize

        4KB

      • memory/656-120-0x0000000005160000-0x0000000005161000-memory.dmp

        Filesize

        4KB

      • memory/656-119-0x0000000005160000-0x0000000005766000-memory.dmp

        Filesize

        6.0MB

      • memory/656-127-0x0000000007180000-0x0000000007181000-memory.dmp

        Filesize

        4KB

      • memory/656-118-0x0000000005270000-0x0000000005271000-memory.dmp

        Filesize

        4KB

      • memory/656-117-0x0000000002C60000-0x0000000002C61000-memory.dmp

        Filesize

        4KB

      • memory/656-116-0x0000000005770000-0x0000000005771000-memory.dmp

        Filesize

        4KB

      • memory/840-208-0x000001C262DA0000-0x000001C262DA2000-memory.dmp

        Filesize

        8KB

      • memory/840-210-0x000001C262DA6000-0x000001C262DA8000-memory.dmp

        Filesize

        8KB

      • memory/840-209-0x000001C262DA3000-0x000001C262DA5000-memory.dmp

        Filesize

        8KB

      • memory/840-231-0x000001C262DA8000-0x000001C262DA9000-memory.dmp

        Filesize

        4KB

      • memory/972-384-0x0000025A86DE3000-0x0000025A86DE5000-memory.dmp

        Filesize

        8KB

      • memory/972-417-0x0000025A86DE8000-0x0000025A86DE9000-memory.dmp

        Filesize

        4KB

      • memory/972-386-0x0000025A86DE6000-0x0000025A86DE8000-memory.dmp

        Filesize

        8KB

      • memory/972-382-0x0000025A86DE0000-0x0000025A86DE2000-memory.dmp

        Filesize

        8KB

      • memory/1504-148-0x000000001BE70000-0x000000001BE72000-memory.dmp

        Filesize

        8KB

      • memory/1504-131-0x0000000000080000-0x0000000000081000-memory.dmp

        Filesize

        4KB

      • memory/1652-234-0x00000182660E3000-0x00000182660E5000-memory.dmp

        Filesize

        8KB

      • memory/1652-233-0x00000182660E0000-0x00000182660E2000-memory.dmp

        Filesize

        8KB

      • memory/1652-270-0x00000182660E8000-0x00000182660E9000-memory.dmp

        Filesize

        4KB

      • memory/1652-269-0x00000182660E6000-0x00000182660E8000-memory.dmp

        Filesize

        8KB

      • memory/1972-381-0x00000238C16B8000-0x00000238C16B9000-memory.dmp

        Filesize

        4KB

      • memory/1972-329-0x00000238C16B0000-0x00000238C16B2000-memory.dmp

        Filesize

        8KB

      • memory/1972-359-0x00000238C16B6000-0x00000238C16B8000-memory.dmp

        Filesize

        8KB

      • memory/1972-330-0x00000238C16B3000-0x00000238C16B5000-memory.dmp

        Filesize

        8KB

      • memory/2076-207-0x00000281C7008000-0x00000281C7009000-memory.dmp

        Filesize

        4KB

      • memory/2076-149-0x00000281C7000000-0x00000281C7002000-memory.dmp

        Filesize

        8KB

      • memory/2076-140-0x00000281AE920000-0x00000281AE921000-memory.dmp

        Filesize

        4KB

      • memory/2076-150-0x00000281C7003000-0x00000281C7005000-memory.dmp

        Filesize

        8KB

      • memory/2076-145-0x00000281C90E0000-0x00000281C90E1000-memory.dmp

        Filesize

        4KB

      • memory/2076-151-0x00000281C7006000-0x00000281C7008000-memory.dmp

        Filesize

        8KB

      • memory/2112-501-0x00000000000D0000-0x00000000000D1000-memory.dmp

        Filesize

        4KB

      • memory/2112-505-0x000000001BDD0000-0x000000001BDD2000-memory.dmp

        Filesize

        8KB

      • memory/2408-504-0x000000001C7E0000-0x000000001C7E2000-memory.dmp

        Filesize

        8KB

      • memory/3444-272-0x000001E354CD0000-0x000001E354CD2000-memory.dmp

        Filesize

        8KB

      • memory/3444-302-0x000001E354CD8000-0x000001E354CD9000-memory.dmp

        Filesize

        4KB

      • memory/3444-273-0x000001E354CD3000-0x000001E354CD5000-memory.dmp

        Filesize

        8KB

      • memory/3444-300-0x000001E354CD6000-0x000001E354CD8000-memory.dmp

        Filesize

        8KB

      • memory/3508-307-0x00000000002E0000-0x00000000002E1000-memory.dmp

        Filesize

        4KB

      • memory/3508-309-0x0000000000D10000-0x0000000000D11000-memory.dmp

        Filesize

        4KB

      • memory/3508-312-0x0000000000EB0000-0x0000000000EB2000-memory.dmp

        Filesize

        8KB

      • memory/4016-460-0x0000027FCCE20000-0x0000027FCCE22000-memory.dmp

        Filesize

        8KB

      • memory/4016-461-0x0000027FCCE23000-0x0000027FCCE25000-memory.dmp

        Filesize

        8KB

      • memory/4016-486-0x0000027FCCE26000-0x0000027FCCE28000-memory.dmp

        Filesize

        8KB

      • memory/4016-487-0x0000027FCCE28000-0x0000027FCCE29000-memory.dmp

        Filesize

        4KB