Analysis

  • max time kernel
    157s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 13:24

General

  • Target

    d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe

  • Size

    12.1MB

  • MD5

    514099bb5934695dce6048da4376d690

  • SHA1

    df84049a83a502ad0db2fb118c89d1878a615b4a

  • SHA256

    d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2

  • SHA512

    ac050605d8ba41d0c5b1f9711ad4be5ba69b116f7a76e1bba27c96139242197bef592ea14eca034a4047a4d2b211a632b328774e0235576c9ecf4a849b34209b

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Cryptocurrency Miner

    Makes network request to known mining pool URL.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe
    "C:\Users\Admin\AppData\Local\Temp\d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\system32\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\~hlkbhps.bat
      2⤵
      • Deletes itself
      PID:776
    • C:\ProgramData\IntelCore\IntelConfigService.exe
      C:\ProgramData\IntelCore\IntelConfigService.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1300
      • C:\ProgramData\IntelCore\Wrap.exe
        C:\ProgramData\IntelCore\Wrap.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "C:\ProgramData\IntelCore\ApplicationsFrameHost.exe" --daemonized
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1008
          • C:\ProgramData\IntelCore\ApplicationsFrameHost.exe
            C:\ProgramData\IntelCore\ApplicationsFrameHost.exe --daemonized
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1152
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c icacls C:\ProgramData\IntelCore /deny "Administrators:(R,REA,RA,RD))"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1244
        • C:\Windows\system32\icacls.exe
          icacls C:\ProgramData\IntelCore /deny "Administrators:(R,REA,RA,RD))"
          4⤵
          • Modifies file permissions
          PID:1284
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c icacls C:\ProgramData\IntelCore /deny "Users:(R,REA,RA,RD)"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:928
        • C:\Windows\system32\icacls.exe
          icacls C:\ProgramData\IntelCore /deny "Users:(R,REA,RA,RD)"
          4⤵
          • Modifies file permissions
          PID:848
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c icacls C:\ProgramData\IntelCore /deny "%username%:(R,REA,RA,RD)"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:932
        • C:\Windows\system32\icacls.exe
          icacls C:\ProgramData\IntelCore /deny "Admin:(R,REA,RA,RD)"
          4⤵
          • Modifies file permissions
          PID:724
      • C:\ProgramData\IntelCore\xCoreManagment.exe
        C:\ProgramData\IntelCore\xCoreManagment.exe
        3⤵
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1588
    • C:\Windows\system32\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\~xpjpqnu.bat
      2⤵
        PID:2000
      • C:\Windows\system32\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\~qnspcag.bat
        2⤵
          PID:1848

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      File Permissions Modification

      1
      T1222

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\IntelCore\ApplicationsFrameHost.exe
        Filesize

        7.6MB

        MD5

        85b56838168f92389c4fb47759094d90

        SHA1

        e94c12cebcf2689a649f65fe2196b0cd092f9b49

        SHA256

        c6a3cb81bde68cd2b55ea83a0fa42d667abe3099295c183ebc07c759f8ce4146

        SHA512

        b9275189feee544c276e16e6543973c26f270c19c1e325b379d7ad852c9b9a1030058f37b88c3b959e3049d0aaecd36437751d4de97a1b5f70802edf3342cd06

      • C:\ProgramData\IntelCore\ApplicationsFrameHost.exe
        Filesize

        7.6MB

        MD5

        85b56838168f92389c4fb47759094d90

        SHA1

        e94c12cebcf2689a649f65fe2196b0cd092f9b49

        SHA256

        c6a3cb81bde68cd2b55ea83a0fa42d667abe3099295c183ebc07c759f8ce4146

        SHA512

        b9275189feee544c276e16e6543973c26f270c19c1e325b379d7ad852c9b9a1030058f37b88c3b959e3049d0aaecd36437751d4de97a1b5f70802edf3342cd06

      • C:\ProgramData\IntelCore\IntelConfigService.exe
        Filesize

        1.7MB

        MD5

        1926e692a993ff45ae4d8c26b6c7f36a

        SHA1

        4d2ce95a046d8c17c9385293b3257f2e370ae235

        SHA256

        5b309b90ac9aef86ab1fac996d016941cf0233b3b4bbc652f87bf8e895e147f0

        SHA512

        4273043caea1387fc89bd22716b710ce2cafc252880e221a4069c657891dbfff1edd07759dde8544f76f21f335f28fb72d005bff9ab7c50b25f17510858a42e7

      • C:\ProgramData\IntelCore\IntelConfigService.exe
        Filesize

        1.7MB

        MD5

        1926e692a993ff45ae4d8c26b6c7f36a

        SHA1

        4d2ce95a046d8c17c9385293b3257f2e370ae235

        SHA256

        5b309b90ac9aef86ab1fac996d016941cf0233b3b4bbc652f87bf8e895e147f0

        SHA512

        4273043caea1387fc89bd22716b710ce2cafc252880e221a4069c657891dbfff1edd07759dde8544f76f21f335f28fb72d005bff9ab7c50b25f17510858a42e7

      • C:\ProgramData\IntelCore\Wrap.exe
        Filesize

        327KB

        MD5

        9813598ca60fc1e908f8236d767b14bf

        SHA1

        e618f2fbdffcea90664d9cef2d2c5d06300679bb

        SHA256

        30b90255f1a9b25d5757075196050730598ed43073d360196f10d382ca0c0bd1

        SHA512

        48b322e255bf920ec633ff768f672a723eee7e16a4c77155fe4c32de5db181ad426e9d1437b0ffb46cd74562a1285bba4b9c9f2672a94a35a9d74b72bd2aaa7d

      • C:\ProgramData\IntelCore\Wrap.exe
        Filesize

        327KB

        MD5

        9813598ca60fc1e908f8236d767b14bf

        SHA1

        e618f2fbdffcea90664d9cef2d2c5d06300679bb

        SHA256

        30b90255f1a9b25d5757075196050730598ed43073d360196f10d382ca0c0bd1

        SHA512

        48b322e255bf920ec633ff768f672a723eee7e16a4c77155fe4c32de5db181ad426e9d1437b0ffb46cd74562a1285bba4b9c9f2672a94a35a9d74b72bd2aaa7d

      • C:\ProgramData\IntelCore\config.json
        Filesize

        4KB

        MD5

        c24d5d9af2807fa7ec862ead919e9241

        SHA1

        a751fc74c64c98454e5d684b118dbaad419a20d1

        SHA256

        3c18f30b4e1eb3d13e9855cb1bf747f358c5ea82bb2433592d82dc0c3d7a5ff2

        SHA512

        0e8efc8954c97cd4da862eeab4362ceb3b787b2a6ad63b994cd09106b5034539eead3c139d7f102a257593e92375d45d39f2e682d1e67b64fd3c8dab45a18f82

      • C:\ProgramData\IntelCore\xCoreManagment.exe
        Filesize

        1.6MB

        MD5

        2badbfde5f8b6ba8c5eb448317703f79

        SHA1

        e873f41b2ee6c6f511ff34027742b845ab187b3f

        SHA256

        1ae2e033aecbc5de970c805dd48e7951c8e10b4f20a429721b93d09a7f655a4f

        SHA512

        a588b345d43856a8a4cbb8f765afc4baffdf8652236adc3a98a3a10cdbd34b7223e39b7c0e8ddb1be0a17092e19250cb900a50047fdc51ca064ae69a6940e428

      • C:\ProgramData\IntelCore\xCoreManagment.exe
        Filesize

        1.6MB

        MD5

        2badbfde5f8b6ba8c5eb448317703f79

        SHA1

        e873f41b2ee6c6f511ff34027742b845ab187b3f

        SHA256

        1ae2e033aecbc5de970c805dd48e7951c8e10b4f20a429721b93d09a7f655a4f

        SHA512

        a588b345d43856a8a4cbb8f765afc4baffdf8652236adc3a98a3a10cdbd34b7223e39b7c0e8ddb1be0a17092e19250cb900a50047fdc51ca064ae69a6940e428

      • C:\Users\Admin\AppData\Local\Temp\~hlkbhps.bat
        Filesize

        189B

        MD5

        d1dcd5b105dc9d9767df1e0f471fa6fa

        SHA1

        60d0fe6137aae6deb0b212d93cf2c1465e1e5217

        SHA256

        2c5b53295c5a66d090d9172a5751f9c94b6007251a4003e0ac66ee651f880560

        SHA512

        5dd676a2299e4b8df2aef506858282e015e035e0a8cb011055b74198a1281e92cb03a715c152c2bbdf41fa88085c57c8568af3c9e3dcb6217fee50cd4c570fa3

      • C:\Users\Admin\AppData\Local\Temp\~qnspcag.bat
        Filesize

        189B

        MD5

        fe1ab66d25e327c207a4d921b1872836

        SHA1

        9d57e0964488b8317645ece406b5fa221abad2ef

        SHA256

        79c1520040e30f94c0ceaa5e48068c467370d01dc3bb901e7be67923837bfb47

        SHA512

        aabb053f7a5c12948ac22706a60f3c038f3574e2773e46173d1ba77ca55221efeac99822d1b86b53fdac279300b43713948ec063a083361782cd857c49e01f9e

      • C:\Users\Admin\AppData\Local\Temp\~xpjpqnu.bat
        Filesize

        189B

        MD5

        8b215283619be3c9093d3246512b8b69

        SHA1

        4d2e04f940ec834e3c4c30cf86847c2a3424cab1

        SHA256

        b82d7ad24d2c60ec2ef70513af2bccba77716de423d328f0bbd06039da82972d

        SHA512

        bc08b80fc1155d3aa55fe98e16658831156ee74d6044a79b016c5b297995e810d4715b59b3e984af06c6d87bfe27c4f9a5080e1799b37cdd6a87414b1c51048a

      • \ProgramData\IntelCore\ApplicationsFrameHost.exe
        Filesize

        7.6MB

        MD5

        85b56838168f92389c4fb47759094d90

        SHA1

        e94c12cebcf2689a649f65fe2196b0cd092f9b49

        SHA256

        c6a3cb81bde68cd2b55ea83a0fa42d667abe3099295c183ebc07c759f8ce4146

        SHA512

        b9275189feee544c276e16e6543973c26f270c19c1e325b379d7ad852c9b9a1030058f37b88c3b959e3049d0aaecd36437751d4de97a1b5f70802edf3342cd06

      • \ProgramData\IntelCore\IntelConfigService.exe
        Filesize

        1.7MB

        MD5

        1926e692a993ff45ae4d8c26b6c7f36a

        SHA1

        4d2ce95a046d8c17c9385293b3257f2e370ae235

        SHA256

        5b309b90ac9aef86ab1fac996d016941cf0233b3b4bbc652f87bf8e895e147f0

        SHA512

        4273043caea1387fc89bd22716b710ce2cafc252880e221a4069c657891dbfff1edd07759dde8544f76f21f335f28fb72d005bff9ab7c50b25f17510858a42e7

      • \ProgramData\IntelCore\Wrap.exe
        Filesize

        327KB

        MD5

        9813598ca60fc1e908f8236d767b14bf

        SHA1

        e618f2fbdffcea90664d9cef2d2c5d06300679bb

        SHA256

        30b90255f1a9b25d5757075196050730598ed43073d360196f10d382ca0c0bd1

        SHA512

        48b322e255bf920ec633ff768f672a723eee7e16a4c77155fe4c32de5db181ad426e9d1437b0ffb46cd74562a1285bba4b9c9f2672a94a35a9d74b72bd2aaa7d

      • \ProgramData\IntelCore\xCoreManagment.exe
        Filesize

        1.6MB

        MD5

        2badbfde5f8b6ba8c5eb448317703f79

        SHA1

        e873f41b2ee6c6f511ff34027742b845ab187b3f

        SHA256

        1ae2e033aecbc5de970c805dd48e7951c8e10b4f20a429721b93d09a7f655a4f

        SHA512

        a588b345d43856a8a4cbb8f765afc4baffdf8652236adc3a98a3a10cdbd34b7223e39b7c0e8ddb1be0a17092e19250cb900a50047fdc51ca064ae69a6940e428

      • memory/724-72-0x0000000000000000-mapping.dmp
      • memory/776-55-0x0000000000000000-mapping.dmp
      • memory/848-71-0x0000000000000000-mapping.dmp
      • memory/928-67-0x0000000000000000-mapping.dmp
      • memory/932-66-0x0000000000000000-mapping.dmp
      • memory/1008-70-0x0000000000000000-mapping.dmp
      • memory/1152-79-0x0000000000000000-mapping.dmp
      • memory/1152-87-0x0000000000400000-0x000000000144A000-memory.dmp
        Filesize

        16.3MB

      • memory/1152-93-0x0000000001470000-0x0000000001474000-memory.dmp
        Filesize

        16KB

      • memory/1244-68-0x0000000000000000-mapping.dmp
      • memory/1284-73-0x0000000000000000-mapping.dmp
      • memory/1300-58-0x0000000000000000-mapping.dmp
      • memory/1588-83-0x0000000000000000-mapping.dmp
      • memory/1624-54-0x000007FEFC061000-0x000007FEFC063000-memory.dmp
        Filesize

        8KB

      • memory/1848-81-0x0000000000000000-mapping.dmp
      • memory/1888-64-0x0000000000000000-mapping.dmp
      • memory/2000-62-0x0000000000000000-mapping.dmp