General

  • Target

    WUDFCompanionHost.exe

  • Size

    2.3MB

  • Sample

    220429-mq39hseehl

  • MD5

    052261452e1738da3400e50b75c1e1a0

  • SHA1

    112da3ebb3708b132413a3776dabadb2b219cc70

  • SHA256

    f5201022495929641ec8f23327dcb08696356608f1a64223e684e220d49cb4fe

  • SHA512

    0654aa6592b1e33958f1171d58f7c2c6cc3889cf21d773b081b01dc78543058163ea9aee94847e7ab0b1274c498793436e6e3dc69833f60b6a4ec4f8c4f2ed47

Malware Config

Targets

    • Target

      WUDFCompanionHost.exe

    • Size

      2.3MB

    • MD5

      052261452e1738da3400e50b75c1e1a0

    • SHA1

      112da3ebb3708b132413a3776dabadb2b219cc70

    • SHA256

      f5201022495929641ec8f23327dcb08696356608f1a64223e684e220d49cb4fe

    • SHA512

      0654aa6592b1e33958f1171d58f7c2c6cc3889cf21d773b081b01dc78543058163ea9aee94847e7ab0b1274c498793436e6e3dc69833f60b6a4ec4f8c4f2ed47

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Stops running service(s)

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Impair Defenses

1
T1562

File Permissions Modification

1
T1222

Impact

Service Stop

1
T1489

Tasks