Resubmissions

13/02/2022, 03:26

220213-dy59eafben 10

25/06/2021, 19:08

210625-fml1gypkn6 8

19/06/2021, 15:14

210619-d3391n953n 10

Analysis

  • max time kernel
    1785s
  • max time network
    1428s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    13/02/2022, 03:26

General

  • Target

    Tray.exe

  • Size

    321KB

  • MD5

    6585cb51ff21007fb9ef936e96c58982

  • SHA1

    7a3d5563460b9935fe84879ee14fabfc7c664825

  • SHA256

    e07b0cd7eca5bc70b07ea786c3ef4da28036c901effa2193a93caf945cb2b334

  • SHA512

    523c7b3ed0907a473eac04c8cb8642eeea1d3a223069f876a7e0bc18075d59f9903319f6b2e3c2fa262158f04c4ad3637568dd9b0558732c8a574ffe566efc7d

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Drops file in Drivers directory 21 IoCs
  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Tray.exe
    "C:\Users\Admin\AppData\Local\Temp\Tray.exe"
    1⤵
    • Drops file in Drivers directory
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:2384
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1004
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1004-136-0x0000022BFE580000-0x0000022BFE590000-memory.dmp

    Filesize

    64KB

  • memory/1004-137-0x0000022BFECE0000-0x0000022BFECF0000-memory.dmp

    Filesize

    64KB

  • memory/1004-138-0x0000022BFF200000-0x0000022BFF204000-memory.dmp

    Filesize

    16KB

  • memory/1004-140-0x0000022BFF220000-0x0000022BFF224000-memory.dmp

    Filesize

    16KB

  • memory/1004-142-0x0000022BFF160000-0x0000022BFF161000-memory.dmp

    Filesize

    4KB

  • memory/1004-144-0x0000022BFF120000-0x0000022BFF121000-memory.dmp

    Filesize

    4KB

  • memory/2384-133-0x000000007477E000-0x000000007477F000-memory.dmp

    Filesize

    4KB

  • memory/2384-134-0x0000000005C20000-0x0000000005C21000-memory.dmp

    Filesize

    4KB

  • memory/2384-135-0x0000000005AD0000-0x0000000005ADA000-memory.dmp

    Filesize

    40KB

  • memory/2384-130-0x0000000000F30000-0x0000000000F84000-memory.dmp

    Filesize

    336KB

  • memory/2384-132-0x00000000059F0000-0x0000000005A82000-memory.dmp

    Filesize

    584KB

  • memory/2384-131-0x0000000005FA0000-0x0000000006544000-memory.dmp

    Filesize

    5.6MB