General
-
Target
2534EECCA5ED157444298473D7C9C82D9DEF5B0A93AC5.exe
-
Size
13.1MB
-
Sample
211123-g12wjsced3
-
MD5
e957c04fe7176fc386d68f693293a2b7
-
SHA1
463c20d755a29323e8994d8edd2c1984c403611b
-
SHA256
2534eecca5ed157444298473d7c9c82d9def5b0a93ac581b75dede2f1a0c0a56
-
SHA512
a25ae8913d4be469dec0a7ede29e59d63d84cb223dd570b804b7dcdce1f0c35c9739e3c2a1c56191aca80618c12e2924ea60957064edcbb36f1abd7b1c4c4080
Static task
static1
Behavioral task
behavioral1
Sample
2534EECCA5ED157444298473D7C9C82D9DEF5B0A93AC5.exe
Resource
win7-en-20211104
Malware Config
Targets
-
-
Target
2534EECCA5ED157444298473D7C9C82D9DEF5B0A93AC5.exe
-
Size
13.1MB
-
MD5
e957c04fe7176fc386d68f693293a2b7
-
SHA1
463c20d755a29323e8994d8edd2c1984c403611b
-
SHA256
2534eecca5ed157444298473d7c9c82d9def5b0a93ac581b75dede2f1a0c0a56
-
SHA512
a25ae8913d4be469dec0a7ede29e59d63d84cb223dd570b804b7dcdce1f0c35c9739e3c2a1c56191aca80618c12e2924ea60957064edcbb36f1abd7b1c4c4080
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
XMRig Miner Payload
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Stops running service(s)
-
Deletes itself
-
Loads dropped DLL
-
Modifies file permissions
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
autoit_exe
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v6
Persistence
Account Manipulation
1Hidden Files and Directories
2Modify Existing Service
3Registry Run Keys / Startup Folder
1Scheduled Task
1Winlogon Helper DLL
1