Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 13:24

General

  • Target

    d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe

  • Size

    12.1MB

  • MD5

    514099bb5934695dce6048da4376d690

  • SHA1

    df84049a83a502ad0db2fb118c89d1878a615b4a

  • SHA256

    d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2

  • SHA512

    ac050605d8ba41d0c5b1f9711ad4be5ba69b116f7a76e1bba27c96139242197bef592ea14eca034a4047a4d2b211a632b328774e0235576c9ecf4a849b34209b

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Cryptocurrency Miner

    Makes network request to known mining pool URL.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe
    "C:\Users\Admin\AppData\Local\Temp\d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~ofoexaw.bat
      2⤵
        PID:1960
      • C:\ProgramData\IntelCore\IntelConfigService.exe
        C:\ProgramData\IntelCore\IntelConfigService.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4088
        • C:\ProgramData\IntelCore\Wrap.exe
          C:\ProgramData\IntelCore\Wrap.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:852
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "C:\ProgramData\IntelCore\ApplicationsFrameHost.exe" --daemonized
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:428
            • C:\ProgramData\IntelCore\ApplicationsFrameHost.exe
              C:\ProgramData\IntelCore\ApplicationsFrameHost.exe --daemonized
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:4968
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c icacls C:\ProgramData\IntelCore /deny "%username%:(R,REA,RA,RD)"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3180
          • C:\Windows\system32\icacls.exe
            icacls C:\ProgramData\IntelCore /deny "Admin:(R,REA,RA,RD)"
            4⤵
            • Modifies file permissions
            PID:4464
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c icacls C:\ProgramData\IntelCore /deny "Administrators:(R,REA,RA,RD))"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1356
          • C:\Windows\system32\icacls.exe
            icacls C:\ProgramData\IntelCore /deny "Administrators:(R,REA,RA,RD))"
            4⤵
            • Modifies file permissions
            PID:4484
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c icacls C:\ProgramData\IntelCore /deny "Users:(R,REA,RA,RD)"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1064
          • C:\Windows\system32\icacls.exe
            icacls C:\ProgramData\IntelCore /deny "Users:(R,REA,RA,RD)"
            4⤵
            • Modifies file permissions
            PID:4480
        • C:\ProgramData\IntelCore\xCoreManagment.exe
          C:\ProgramData\IntelCore\xCoreManagment.exe
          3⤵
          • Adds policy Run key to start application
          • Executes dropped EXE
          • Drops startup file
          • Adds Run key to start application
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1756
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~iybsdod.bat
        2⤵
          PID:4188
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~uucuvks.bat
          2⤵
            PID:456

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        2
        T1060

        Defense Evasion

        Modify Registry

        2
        T1112

        File Permissions Modification

        1
        T1222

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\IntelCore\ApplicationsFrameHost.exe
          Filesize

          7.6MB

          MD5

          85b56838168f92389c4fb47759094d90

          SHA1

          e94c12cebcf2689a649f65fe2196b0cd092f9b49

          SHA256

          c6a3cb81bde68cd2b55ea83a0fa42d667abe3099295c183ebc07c759f8ce4146

          SHA512

          b9275189feee544c276e16e6543973c26f270c19c1e325b379d7ad852c9b9a1030058f37b88c3b959e3049d0aaecd36437751d4de97a1b5f70802edf3342cd06

        • C:\ProgramData\IntelCore\ApplicationsFrameHost.exe
          Filesize

          7.6MB

          MD5

          85b56838168f92389c4fb47759094d90

          SHA1

          e94c12cebcf2689a649f65fe2196b0cd092f9b49

          SHA256

          c6a3cb81bde68cd2b55ea83a0fa42d667abe3099295c183ebc07c759f8ce4146

          SHA512

          b9275189feee544c276e16e6543973c26f270c19c1e325b379d7ad852c9b9a1030058f37b88c3b959e3049d0aaecd36437751d4de97a1b5f70802edf3342cd06

        • C:\ProgramData\IntelCore\IntelConfigService.exe
          Filesize

          1.7MB

          MD5

          1926e692a993ff45ae4d8c26b6c7f36a

          SHA1

          4d2ce95a046d8c17c9385293b3257f2e370ae235

          SHA256

          5b309b90ac9aef86ab1fac996d016941cf0233b3b4bbc652f87bf8e895e147f0

          SHA512

          4273043caea1387fc89bd22716b710ce2cafc252880e221a4069c657891dbfff1edd07759dde8544f76f21f335f28fb72d005bff9ab7c50b25f17510858a42e7

        • C:\ProgramData\IntelCore\IntelConfigService.exe
          Filesize

          1.7MB

          MD5

          1926e692a993ff45ae4d8c26b6c7f36a

          SHA1

          4d2ce95a046d8c17c9385293b3257f2e370ae235

          SHA256

          5b309b90ac9aef86ab1fac996d016941cf0233b3b4bbc652f87bf8e895e147f0

          SHA512

          4273043caea1387fc89bd22716b710ce2cafc252880e221a4069c657891dbfff1edd07759dde8544f76f21f335f28fb72d005bff9ab7c50b25f17510858a42e7

        • C:\ProgramData\IntelCore\Wrap.exe
          Filesize

          327KB

          MD5

          9813598ca60fc1e908f8236d767b14bf

          SHA1

          e618f2fbdffcea90664d9cef2d2c5d06300679bb

          SHA256

          30b90255f1a9b25d5757075196050730598ed43073d360196f10d382ca0c0bd1

          SHA512

          48b322e255bf920ec633ff768f672a723eee7e16a4c77155fe4c32de5db181ad426e9d1437b0ffb46cd74562a1285bba4b9c9f2672a94a35a9d74b72bd2aaa7d

        • C:\ProgramData\IntelCore\Wrap.exe
          Filesize

          327KB

          MD5

          9813598ca60fc1e908f8236d767b14bf

          SHA1

          e618f2fbdffcea90664d9cef2d2c5d06300679bb

          SHA256

          30b90255f1a9b25d5757075196050730598ed43073d360196f10d382ca0c0bd1

          SHA512

          48b322e255bf920ec633ff768f672a723eee7e16a4c77155fe4c32de5db181ad426e9d1437b0ffb46cd74562a1285bba4b9c9f2672a94a35a9d74b72bd2aaa7d

        • C:\ProgramData\IntelCore\config.json
          Filesize

          4KB

          MD5

          c24d5d9af2807fa7ec862ead919e9241

          SHA1

          a751fc74c64c98454e5d684b118dbaad419a20d1

          SHA256

          3c18f30b4e1eb3d13e9855cb1bf747f358c5ea82bb2433592d82dc0c3d7a5ff2

          SHA512

          0e8efc8954c97cd4da862eeab4362ceb3b787b2a6ad63b994cd09106b5034539eead3c139d7f102a257593e92375d45d39f2e682d1e67b64fd3c8dab45a18f82

        • C:\ProgramData\IntelCore\xCoreManagment.exe
          Filesize

          1.6MB

          MD5

          2badbfde5f8b6ba8c5eb448317703f79

          SHA1

          e873f41b2ee6c6f511ff34027742b845ab187b3f

          SHA256

          1ae2e033aecbc5de970c805dd48e7951c8e10b4f20a429721b93d09a7f655a4f

          SHA512

          a588b345d43856a8a4cbb8f765afc4baffdf8652236adc3a98a3a10cdbd34b7223e39b7c0e8ddb1be0a17092e19250cb900a50047fdc51ca064ae69a6940e428

        • C:\ProgramData\IntelCore\xCoreManagment.exe
          Filesize

          1.6MB

          MD5

          2badbfde5f8b6ba8c5eb448317703f79

          SHA1

          e873f41b2ee6c6f511ff34027742b845ab187b3f

          SHA256

          1ae2e033aecbc5de970c805dd48e7951c8e10b4f20a429721b93d09a7f655a4f

          SHA512

          a588b345d43856a8a4cbb8f765afc4baffdf8652236adc3a98a3a10cdbd34b7223e39b7c0e8ddb1be0a17092e19250cb900a50047fdc51ca064ae69a6940e428

        • C:\Users\Admin\AppData\Local\Temp\~iybsdod.bat
          Filesize

          189B

          MD5

          630d6dbfeaa2ec71be17ae5b34030907

          SHA1

          d06bb2c512de8c9937058538aa2649147f020e58

          SHA256

          98912eb77e4343adbf9330ae239a171b4a12ddac52b11198828f788fb19452b6

          SHA512

          fd52951504589b1a4a5d50586ee3838105944795410a0dbf84bbe8d1390e1a54d157a59deaa3644b81617fdb159f49834dd83ec57bb804b54ede9015a46526e8

        • C:\Users\Admin\AppData\Local\Temp\~ofoexaw.bat
          Filesize

          189B

          MD5

          982d1a9cfc005e6ca8edb1433fa73cdf

          SHA1

          a0945e13f37a92caa688a4c58e96d84ac671a734

          SHA256

          d0cd7040f5bd57b82964cdc98d9fec6a55f0cfafd8b2f3e2b3e5efb936787600

          SHA512

          f85dfd952dd4db830a8c8287fa725254a168a66c8ebe598b47396d59e8fb0569c2278b32711ea2c8a4ceb5a75feb92672c68746505eefaf23946622963093925

        • C:\Users\Admin\AppData\Local\Temp\~uucuvks.bat
          Filesize

          189B

          MD5

          38834f934d56e743d7c4a9e292a7e051

          SHA1

          9e1b0bbf151e922590b443fc52f874b380d70652

          SHA256

          33594455a41b41a694b8d6959e3d5083e842f4cf51e4cf080b0442885cd41b36

          SHA512

          0785711df2e64cdd51baa14b8778d4407e04ccc565594ded82a6d7e8bfac8994dd014c2972efa71c3c0d1ede798b23c397a7e1912f058862d67c23ca0a4f9ab5

        • memory/428-140-0x0000000000000000-mapping.dmp
        • memory/456-154-0x0000000000000000-mapping.dmp
        • memory/852-135-0x0000000000000000-mapping.dmp
        • memory/1064-138-0x0000000000000000-mapping.dmp
        • memory/1356-139-0x0000000000000000-mapping.dmp
        • memory/1756-151-0x0000000000000000-mapping.dmp
        • memory/1960-130-0x0000000000000000-mapping.dmp
        • memory/3180-137-0x0000000000000000-mapping.dmp
        • memory/4088-132-0x0000000000000000-mapping.dmp
        • memory/4188-150-0x0000000000000000-mapping.dmp
        • memory/4464-143-0x0000000000000000-mapping.dmp
        • memory/4480-141-0x0000000000000000-mapping.dmp
        • memory/4484-142-0x0000000000000000-mapping.dmp
        • memory/4968-148-0x0000000000000000-mapping.dmp
        • memory/4968-156-0x0000000000400000-0x000000000144A000-memory.dmp
          Filesize

          16.3MB

        • memory/4968-161-0x00000000001C0000-0x00000000001C4000-memory.dmp
          Filesize

          16KB