Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 13:24
Static task
static1
Behavioral task
behavioral1
Sample
d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe
Resource
win10v2004-20220414-en
General
-
Target
d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe
-
Size
12.1MB
-
MD5
514099bb5934695dce6048da4376d690
-
SHA1
df84049a83a502ad0db2fb118c89d1878a615b4a
-
SHA256
d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2
-
SHA512
ac050605d8ba41d0c5b1f9711ad4be5ba69b116f7a76e1bba27c96139242197bef592ea14eca034a4047a4d2b211a632b328774e0235576c9ecf4a849b34209b
Malware Config
Signatures
-
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4968-156-0x0000000000400000-0x000000000144A000-memory.dmp xmrig -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
xCoreManagment.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xCoreManagment.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Start-Up Application = "C:\\ProgramData\\WindowsTools\\WindFlash.exe" xCoreManagment.exe -
Executes dropped EXE 4 IoCs
Processes:
IntelConfigService.exeWrap.exeApplicationsFrameHost.exexCoreManagment.exepid process 4088 IntelConfigService.exe 852 Wrap.exe 4968 ApplicationsFrameHost.exe 1756 xCoreManagment.exe -
Cryptocurrency Miner
Makes network request to known mining pool URL.
-
Drops startup file 2 IoCs
Processes:
xCoreManagment.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsStartUpApplication.lnk xCoreManagment.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsStartUpApplication.lnk xCoreManagment.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exeicacls.exepid process 4464 icacls.exe 4484 icacls.exe 4480 icacls.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
xCoreManagment.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xCoreManagment.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Start-Up Application = "C:\\ProgramData\\WindowsTools\\WindFlash.exe" xCoreManagment.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xCoreManagment.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Start-Up Application = "C:\\ProgramData\\WindowsTools\\WindFlash.exe" xCoreManagment.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\ProgramData\IntelCore\IntelConfigService.exe autoit_exe C:\ProgramData\IntelCore\IntelConfigService.exe autoit_exe C:\ProgramData\IntelCore\xCoreManagment.exe autoit_exe C:\ProgramData\IntelCore\xCoreManagment.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exeIntelConfigService.exepid process 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ApplicationsFrameHost.exedescription pid process Token: SeLockMemoryPrivilege 4968 ApplicationsFrameHost.exe Token: SeLockMemoryPrivilege 4968 ApplicationsFrameHost.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
Processes:
d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exeIntelConfigService.exexCoreManagment.exepid process 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 1756 xCoreManagment.exe 1756 xCoreManagment.exe 1756 xCoreManagment.exe -
Suspicious use of SendNotifyMessage 13 IoCs
Processes:
d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exeIntelConfigService.exexCoreManagment.exepid process 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 4088 IntelConfigService.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe 1756 xCoreManagment.exe 1756 xCoreManagment.exe 1756 xCoreManagment.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exeIntelConfigService.exeWrap.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2684 wrote to memory of 1960 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe cmd.exe PID 2684 wrote to memory of 1960 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe cmd.exe PID 2684 wrote to memory of 4088 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe IntelConfigService.exe PID 2684 wrote to memory of 4088 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe IntelConfigService.exe PID 4088 wrote to memory of 852 4088 IntelConfigService.exe Wrap.exe PID 4088 wrote to memory of 852 4088 IntelConfigService.exe Wrap.exe PID 4088 wrote to memory of 3180 4088 IntelConfigService.exe cmd.exe PID 4088 wrote to memory of 3180 4088 IntelConfigService.exe cmd.exe PID 4088 wrote to memory of 1064 4088 IntelConfigService.exe cmd.exe PID 4088 wrote to memory of 1064 4088 IntelConfigService.exe cmd.exe PID 4088 wrote to memory of 1356 4088 IntelConfigService.exe cmd.exe PID 4088 wrote to memory of 1356 4088 IntelConfigService.exe cmd.exe PID 852 wrote to memory of 428 852 Wrap.exe cmd.exe PID 852 wrote to memory of 428 852 Wrap.exe cmd.exe PID 1064 wrote to memory of 4480 1064 cmd.exe icacls.exe PID 1064 wrote to memory of 4480 1064 cmd.exe icacls.exe PID 1356 wrote to memory of 4484 1356 cmd.exe icacls.exe PID 1356 wrote to memory of 4484 1356 cmd.exe icacls.exe PID 3180 wrote to memory of 4464 3180 cmd.exe icacls.exe PID 3180 wrote to memory of 4464 3180 cmd.exe icacls.exe PID 428 wrote to memory of 4968 428 cmd.exe ApplicationsFrameHost.exe PID 428 wrote to memory of 4968 428 cmd.exe ApplicationsFrameHost.exe PID 2684 wrote to memory of 4188 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe cmd.exe PID 2684 wrote to memory of 4188 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe cmd.exe PID 4088 wrote to memory of 1756 4088 IntelConfigService.exe xCoreManagment.exe PID 4088 wrote to memory of 1756 4088 IntelConfigService.exe xCoreManagment.exe PID 2684 wrote to memory of 456 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe cmd.exe PID 2684 wrote to memory of 456 2684 d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe"C:\Users\Admin\AppData\Local\Temp\d1238dcc889df13c51a8d02952c30ba4370ebe4a0b8ce173a83ca267d8f945d2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~ofoexaw.bat2⤵
-
C:\ProgramData\IntelCore\IntelConfigService.exeC:\ProgramData\IntelCore\IntelConfigService.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\IntelCore\Wrap.exeC:\ProgramData\IntelCore\Wrap.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\IntelCore\ApplicationsFrameHost.exe" --daemonized4⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\IntelCore\ApplicationsFrameHost.exeC:\ProgramData\IntelCore\ApplicationsFrameHost.exe --daemonized5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\ProgramData\IntelCore /deny "%username%:(R,REA,RA,RD)"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls C:\ProgramData\IntelCore /deny "Admin:(R,REA,RA,RD)"4⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\ProgramData\IntelCore /deny "Administrators:(R,REA,RA,RD))"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls C:\ProgramData\IntelCore /deny "Administrators:(R,REA,RA,RD))"4⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\ProgramData\IntelCore /deny "Users:(R,REA,RA,RD)"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls C:\ProgramData\IntelCore /deny "Users:(R,REA,RA,RD)"4⤵
- Modifies file permissions
-
C:\ProgramData\IntelCore\xCoreManagment.exeC:\ProgramData\IntelCore\xCoreManagment.exe3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~iybsdod.bat2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~uucuvks.bat2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\IntelCore\ApplicationsFrameHost.exeFilesize
7.6MB
MD585b56838168f92389c4fb47759094d90
SHA1e94c12cebcf2689a649f65fe2196b0cd092f9b49
SHA256c6a3cb81bde68cd2b55ea83a0fa42d667abe3099295c183ebc07c759f8ce4146
SHA512b9275189feee544c276e16e6543973c26f270c19c1e325b379d7ad852c9b9a1030058f37b88c3b959e3049d0aaecd36437751d4de97a1b5f70802edf3342cd06
-
C:\ProgramData\IntelCore\ApplicationsFrameHost.exeFilesize
7.6MB
MD585b56838168f92389c4fb47759094d90
SHA1e94c12cebcf2689a649f65fe2196b0cd092f9b49
SHA256c6a3cb81bde68cd2b55ea83a0fa42d667abe3099295c183ebc07c759f8ce4146
SHA512b9275189feee544c276e16e6543973c26f270c19c1e325b379d7ad852c9b9a1030058f37b88c3b959e3049d0aaecd36437751d4de97a1b5f70802edf3342cd06
-
C:\ProgramData\IntelCore\IntelConfigService.exeFilesize
1.7MB
MD51926e692a993ff45ae4d8c26b6c7f36a
SHA14d2ce95a046d8c17c9385293b3257f2e370ae235
SHA2565b309b90ac9aef86ab1fac996d016941cf0233b3b4bbc652f87bf8e895e147f0
SHA5124273043caea1387fc89bd22716b710ce2cafc252880e221a4069c657891dbfff1edd07759dde8544f76f21f335f28fb72d005bff9ab7c50b25f17510858a42e7
-
C:\ProgramData\IntelCore\IntelConfigService.exeFilesize
1.7MB
MD51926e692a993ff45ae4d8c26b6c7f36a
SHA14d2ce95a046d8c17c9385293b3257f2e370ae235
SHA2565b309b90ac9aef86ab1fac996d016941cf0233b3b4bbc652f87bf8e895e147f0
SHA5124273043caea1387fc89bd22716b710ce2cafc252880e221a4069c657891dbfff1edd07759dde8544f76f21f335f28fb72d005bff9ab7c50b25f17510858a42e7
-
C:\ProgramData\IntelCore\Wrap.exeFilesize
327KB
MD59813598ca60fc1e908f8236d767b14bf
SHA1e618f2fbdffcea90664d9cef2d2c5d06300679bb
SHA25630b90255f1a9b25d5757075196050730598ed43073d360196f10d382ca0c0bd1
SHA51248b322e255bf920ec633ff768f672a723eee7e16a4c77155fe4c32de5db181ad426e9d1437b0ffb46cd74562a1285bba4b9c9f2672a94a35a9d74b72bd2aaa7d
-
C:\ProgramData\IntelCore\Wrap.exeFilesize
327KB
MD59813598ca60fc1e908f8236d767b14bf
SHA1e618f2fbdffcea90664d9cef2d2c5d06300679bb
SHA25630b90255f1a9b25d5757075196050730598ed43073d360196f10d382ca0c0bd1
SHA51248b322e255bf920ec633ff768f672a723eee7e16a4c77155fe4c32de5db181ad426e9d1437b0ffb46cd74562a1285bba4b9c9f2672a94a35a9d74b72bd2aaa7d
-
C:\ProgramData\IntelCore\config.jsonFilesize
4KB
MD5c24d5d9af2807fa7ec862ead919e9241
SHA1a751fc74c64c98454e5d684b118dbaad419a20d1
SHA2563c18f30b4e1eb3d13e9855cb1bf747f358c5ea82bb2433592d82dc0c3d7a5ff2
SHA5120e8efc8954c97cd4da862eeab4362ceb3b787b2a6ad63b994cd09106b5034539eead3c139d7f102a257593e92375d45d39f2e682d1e67b64fd3c8dab45a18f82
-
C:\ProgramData\IntelCore\xCoreManagment.exeFilesize
1.6MB
MD52badbfde5f8b6ba8c5eb448317703f79
SHA1e873f41b2ee6c6f511ff34027742b845ab187b3f
SHA2561ae2e033aecbc5de970c805dd48e7951c8e10b4f20a429721b93d09a7f655a4f
SHA512a588b345d43856a8a4cbb8f765afc4baffdf8652236adc3a98a3a10cdbd34b7223e39b7c0e8ddb1be0a17092e19250cb900a50047fdc51ca064ae69a6940e428
-
C:\ProgramData\IntelCore\xCoreManagment.exeFilesize
1.6MB
MD52badbfde5f8b6ba8c5eb448317703f79
SHA1e873f41b2ee6c6f511ff34027742b845ab187b3f
SHA2561ae2e033aecbc5de970c805dd48e7951c8e10b4f20a429721b93d09a7f655a4f
SHA512a588b345d43856a8a4cbb8f765afc4baffdf8652236adc3a98a3a10cdbd34b7223e39b7c0e8ddb1be0a17092e19250cb900a50047fdc51ca064ae69a6940e428
-
C:\Users\Admin\AppData\Local\Temp\~iybsdod.batFilesize
189B
MD5630d6dbfeaa2ec71be17ae5b34030907
SHA1d06bb2c512de8c9937058538aa2649147f020e58
SHA25698912eb77e4343adbf9330ae239a171b4a12ddac52b11198828f788fb19452b6
SHA512fd52951504589b1a4a5d50586ee3838105944795410a0dbf84bbe8d1390e1a54d157a59deaa3644b81617fdb159f49834dd83ec57bb804b54ede9015a46526e8
-
C:\Users\Admin\AppData\Local\Temp\~ofoexaw.batFilesize
189B
MD5982d1a9cfc005e6ca8edb1433fa73cdf
SHA1a0945e13f37a92caa688a4c58e96d84ac671a734
SHA256d0cd7040f5bd57b82964cdc98d9fec6a55f0cfafd8b2f3e2b3e5efb936787600
SHA512f85dfd952dd4db830a8c8287fa725254a168a66c8ebe598b47396d59e8fb0569c2278b32711ea2c8a4ceb5a75feb92672c68746505eefaf23946622963093925
-
C:\Users\Admin\AppData\Local\Temp\~uucuvks.batFilesize
189B
MD538834f934d56e743d7c4a9e292a7e051
SHA19e1b0bbf151e922590b443fc52f874b380d70652
SHA25633594455a41b41a694b8d6959e3d5083e842f4cf51e4cf080b0442885cd41b36
SHA5120785711df2e64cdd51baa14b8778d4407e04ccc565594ded82a6d7e8bfac8994dd014c2972efa71c3c0d1ede798b23c397a7e1912f058862d67c23ca0a4f9ab5
-
memory/428-140-0x0000000000000000-mapping.dmp
-
memory/456-154-0x0000000000000000-mapping.dmp
-
memory/852-135-0x0000000000000000-mapping.dmp
-
memory/1064-138-0x0000000000000000-mapping.dmp
-
memory/1356-139-0x0000000000000000-mapping.dmp
-
memory/1756-151-0x0000000000000000-mapping.dmp
-
memory/1960-130-0x0000000000000000-mapping.dmp
-
memory/3180-137-0x0000000000000000-mapping.dmp
-
memory/4088-132-0x0000000000000000-mapping.dmp
-
memory/4188-150-0x0000000000000000-mapping.dmp
-
memory/4464-143-0x0000000000000000-mapping.dmp
-
memory/4480-141-0x0000000000000000-mapping.dmp
-
memory/4484-142-0x0000000000000000-mapping.dmp
-
memory/4968-148-0x0000000000000000-mapping.dmp
-
memory/4968-156-0x0000000000400000-0x000000000144A000-memory.dmpFilesize
16.3MB
-
memory/4968-161-0x00000000001C0000-0x00000000001C4000-memory.dmpFilesize
16KB