Analysis

  • max time kernel
    34s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    01-07-2022 05:29

General

  • Target

    45d584834f8b78434efee0a0480aad859cf110e05cd5323753cc1d96db5dd515.exe

  • Size

    5.1MB

  • MD5

    365568e365b8c72be3cc954c6284a7ec

  • SHA1

    a2606bdbd7aa3bf7b2a39aa0b627fd5f2bf9c536

  • SHA256

    45d584834f8b78434efee0a0480aad859cf110e05cd5323753cc1d96db5dd515

  • SHA512

    3ff274f3db5c7f5ec46c602318d795aafcd0b7eb05dfe5f57468fc8a937c292370a2e6a93ff65fd183fc8fe3c310a5e5be7e599eb6df670a06d51e6569fc0d29

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • XMRig Miner Payload 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45d584834f8b78434efee0a0480aad859cf110e05cd5323753cc1d96db5dd515.exe
    "C:\Users\Admin\AppData\Local\Temp\45d584834f8b78434efee0a0480aad859cf110e05cd5323753cc1d96db5dd515.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1972

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1972-54-0x0000000075F21000-0x0000000075F23000-memory.dmp
    Filesize

    8KB

  • memory/1972-55-0x0000000000400000-0x00000000011C8000-memory.dmp
    Filesize

    13.8MB

  • memory/1972-56-0x0000000077D00000-0x0000000077E80000-memory.dmp
    Filesize

    1.5MB

  • memory/1972-57-0x0000000000400000-0x00000000011C8000-memory.dmp
    Filesize

    13.8MB

  • memory/1972-58-0x0000000000400000-0x00000000011C8000-memory.dmp
    Filesize

    13.8MB

  • memory/1972-59-0x0000000000400000-0x00000000011C8000-memory.dmp
    Filesize

    13.8MB

  • memory/1972-60-0x0000000000400000-0x00000000011C8000-memory.dmp
    Filesize

    13.8MB

  • memory/1972-61-0x0000000000400000-0x00000000011C8000-memory.dmp
    Filesize

    13.8MB

  • memory/1972-62-0x0000000077D00000-0x0000000077E80000-memory.dmp
    Filesize

    1.5MB