Resubmissions
15-07-2022 23:01
220715-2zsxgafhgk 1015-07-2022 22:50
220715-2splgafhdm 1015-07-2022 22:20
220715-188hvafgcj 10Analysis
-
max time kernel
300s -
max time network
289s -
platform
windows10_x64 -
resource
win10-20220414-en -
resource tags
arch:x64arch:x86image:win10-20220414-enlocale:en-usos:windows10-1703-x64system -
submitted
15-07-2022 22:20
Static task
static1
Behavioral task
behavioral1
Sample
e01031275ef9cee42de309d2e23b5d8bb5831aaf8adfad8289472a27192331f2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e01031275ef9cee42de309d2e23b5d8bb5831aaf8adfad8289472a27192331f2.exe
Resource
win10-20220414-en
General
-
Target
e01031275ef9cee42de309d2e23b5d8bb5831aaf8adfad8289472a27192331f2.exe
-
Size
4.7MB
-
MD5
b81617f91ae5dfc6ba926f807f908ec2
-
SHA1
569b4c96d628ac2fe57ba7851a28ff48eee19270
-
SHA256
e01031275ef9cee42de309d2e23b5d8bb5831aaf8adfad8289472a27192331f2
-
SHA512
440220ad23d8313e8d59799bdc04c72b69e34831e9022f4897a4510556115912a295784baeeef82a17ab7ddedc5db41948e0722043eadff43a813d95fcd02545
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/4780-156-0x0000000140000000-0x0000000140809000-memory.dmp xmrig behavioral2/memory/4780-157-0x000000014036EAC4-mapping.dmp xmrig behavioral2/memory/4780-158-0x0000000140000000-0x0000000140809000-memory.dmp xmrig behavioral2/memory/4780-159-0x0000000140000000-0x0000000140809000-memory.dmp xmrig behavioral2/memory/4780-161-0x0000000140000000-0x0000000140809000-memory.dmp xmrig behavioral2/memory/4780-162-0x0000000140000000-0x0000000140809000-memory.dmp xmrig -
Executes dropped EXE 2 IoCs
Processes:
mmgaserver.exemmgaserver.exepid process 4580 mmgaserver.exe 2004 mmgaserver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
mmgaserver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4236190499-842014725-259441995-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetVPUpdater = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\NetVPUpdater.exe\"" mmgaserver.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
mmgaserver.exemmgaserver.exedescription pid process target process PID 4580 set thread context of 2004 4580 mmgaserver.exe mmgaserver.exe PID 2004 set thread context of 4780 2004 mmgaserver.exe notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exemmgaserver.exenotepad.exepid process 2828 powershell.exe 2828 powershell.exe 2828 powershell.exe 4580 mmgaserver.exe 4580 mmgaserver.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exemmgaserver.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exenotepad.exedescription pid process Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 4580 mmgaserver.exe Token: SeShutdownPrivilege 4744 powercfg.exe Token: SeCreatePagefilePrivilege 4744 powercfg.exe Token: SeShutdownPrivilege 360 powercfg.exe Token: SeCreatePagefilePrivilege 360 powercfg.exe Token: SeShutdownPrivilege 3464 powercfg.exe Token: SeCreatePagefilePrivilege 3464 powercfg.exe Token: SeShutdownPrivilege 3544 powercfg.exe Token: SeCreatePagefilePrivilege 3544 powercfg.exe Token: SeLockMemoryPrivilege 4780 notepad.exe Token: SeLockMemoryPrivilege 4780 notepad.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
notepad.exepid process 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
notepad.exepid process 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe 4780 notepad.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
e01031275ef9cee42de309d2e23b5d8bb5831aaf8adfad8289472a27192331f2.exemmgaserver.exemmgaserver.execmd.exedescription pid process target process PID 4556 wrote to memory of 4580 4556 e01031275ef9cee42de309d2e23b5d8bb5831aaf8adfad8289472a27192331f2.exe mmgaserver.exe PID 4556 wrote to memory of 4580 4556 e01031275ef9cee42de309d2e23b5d8bb5831aaf8adfad8289472a27192331f2.exe mmgaserver.exe PID 4580 wrote to memory of 2828 4580 mmgaserver.exe powershell.exe PID 4580 wrote to memory of 2828 4580 mmgaserver.exe powershell.exe PID 4580 wrote to memory of 2004 4580 mmgaserver.exe mmgaserver.exe PID 4580 wrote to memory of 2004 4580 mmgaserver.exe mmgaserver.exe PID 4580 wrote to memory of 2004 4580 mmgaserver.exe mmgaserver.exe PID 4580 wrote to memory of 2004 4580 mmgaserver.exe mmgaserver.exe PID 4580 wrote to memory of 2004 4580 mmgaserver.exe mmgaserver.exe PID 4580 wrote to memory of 2004 4580 mmgaserver.exe mmgaserver.exe PID 2004 wrote to memory of 5056 2004 mmgaserver.exe cmd.exe PID 2004 wrote to memory of 5056 2004 mmgaserver.exe cmd.exe PID 5056 wrote to memory of 4744 5056 cmd.exe powercfg.exe PID 5056 wrote to memory of 4744 5056 cmd.exe powercfg.exe PID 5056 wrote to memory of 360 5056 cmd.exe powercfg.exe PID 5056 wrote to memory of 360 5056 cmd.exe powercfg.exe PID 5056 wrote to memory of 3464 5056 cmd.exe powercfg.exe PID 5056 wrote to memory of 3464 5056 cmd.exe powercfg.exe PID 5056 wrote to memory of 3544 5056 cmd.exe powercfg.exe PID 5056 wrote to memory of 3544 5056 cmd.exe powercfg.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe PID 2004 wrote to memory of 4780 2004 mmgaserver.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e01031275ef9cee42de309d2e23b5d8bb5831aaf8adfad8289472a27192331f2.exe"C:\Users\Admin\AppData\Local\Temp\e01031275ef9cee42de309d2e23b5d8bb5831aaf8adfad8289472a27192331f2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\mmgaserver.exe"C:\Users\Admin\AppData\Local\Temp\mmgaserver.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANAA1AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\mmgaserver.exeC:\Users\Admin\AppData\Local\Temp\mmgaserver.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 04⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:4744 -
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:360 -
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:3544 -
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:3464 -
C:\Windows\System32\notepad.exeC:\Windows\System32\notepad.exe eibjreadarlwhqjb0 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4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\mmgaserver.exe.logFilesize
621B
MD5431293de3fad018871bc380403c6f53c
SHA1935699de6ea2086cec2612f7716d147ced286768
SHA2561d7ced4ac3efd413157af7c0d8167ab87f1060c576dc86e5518283874df2b55f
SHA512b33b49ffb96a325da7b6d77b3c95014b2b6ff985fd6553ce80487789a8d8b56e4e24d0f819108c271146ccd188d1a7d68ba630441b065f9ddb47602297fa6c62
-
C:\Users\Admin\AppData\Local\Temp\mmgaserver.exeFilesize
462.4MB
MD5dbf65eb46c976c3e33de7cfbfd87b3aa
SHA13b248dbfbd08de1bab883adc72007ef496acad44
SHA25671b5c16523d15f48c71792701501cd65bc7bdf368ee104f6a71c6b0eb8bca372
SHA51269020a4cce9e6f94a7bf16b77b902acebf133c8d5d6a2a34ffd35e2fcf74cfc55de7df22c5ab281fde82f693a0322081e8b7f8b3910fb76b3cbfa2064ff74193
-
C:\Users\Admin\AppData\Local\Temp\mmgaserver.exeFilesize
454.5MB
MD5aeff6084da46cb103be3aedbc9bb1996
SHA1cbcc66e7db44cde92f0f7acadd81eaddc50f3fa5
SHA256b113eb62a22afee2a209c7c4f3a14eb8fa4d62b57c1b3f72ae8279f40fc19128
SHA5126d255550558794486b5b39dacd4063c89c453537562550276654e8b8f6c4de2b1db4562aeb83e3abfcad5cae3131d8ac3cebc49d87171f53e8c88b1ff8146c37
-
C:\Users\Admin\AppData\Local\Temp\mmgaserver.exeFilesize
202.1MB
MD5fbde723c5279431edcb3afde8532f607
SHA159e6827e2e53c7beadf075e925f7e2d2c5ccbedd
SHA2568b1258dc73f4f8450837ad97dcdea9515e2bd81d41e8db202ad8c2cc6f6c7821
SHA5127b67ef1bbb4b56ceda6adc979faed70e3da9777a8f20cde8526310318fe6b9384e7fef951ba5e2cce5a4098dd954c865ba636a1c24a47a846a529c92ed61fbca
-
memory/360-151-0x0000000000000000-mapping.dmp
-
memory/2004-153-0x0000025598DD0000-0x0000025598DE2000-memory.dmpFilesize
72KB
-
memory/2004-155-0x0000025598DF0000-0x0000025598DF6000-memory.dmpFilesize
24KB
-
memory/2004-145-0x0000000000400000-0x0000000000828000-memory.dmpFilesize
4.2MB
-
memory/2004-146-0x0000000000400000-mapping.dmp
-
memory/2828-126-0x0000000000000000-mapping.dmp
-
memory/2828-132-0x000002933FAA0000-0x000002933FAC2000-memory.dmpFilesize
136KB
-
memory/2828-136-0x000002935A740000-0x000002935A7B6000-memory.dmpFilesize
472KB
-
memory/3464-152-0x0000000000000000-mapping.dmp
-
memory/3544-154-0x0000000000000000-mapping.dmp
-
memory/4580-124-0x000001D918F30000-0x000001D91936E000-memory.dmpFilesize
4.2MB
-
memory/4580-119-0x0000000000000000-mapping.dmp
-
memory/4580-125-0x000001D900220000-0x000001D90026C000-memory.dmpFilesize
304KB
-
memory/4580-123-0x000001D918AD0000-0x000001D918F2E000-memory.dmpFilesize
4.4MB
-
memory/4580-122-0x000001D973A80000-0x000001D973EDE000-memory.dmpFilesize
4.4MB
-
memory/4744-150-0x0000000000000000-mapping.dmp
-
memory/4780-156-0x0000000140000000-0x0000000140809000-memory.dmpFilesize
8.0MB
-
memory/4780-157-0x000000014036EAC4-mapping.dmp
-
memory/4780-158-0x0000000140000000-0x0000000140809000-memory.dmpFilesize
8.0MB
-
memory/4780-159-0x0000000140000000-0x0000000140809000-memory.dmpFilesize
8.0MB
-
memory/4780-160-0x000001AE015A0000-0x000001AE015C0000-memory.dmpFilesize
128KB
-
memory/4780-161-0x0000000140000000-0x0000000140809000-memory.dmpFilesize
8.0MB
-
memory/4780-162-0x0000000140000000-0x0000000140809000-memory.dmpFilesize
8.0MB
-
memory/5056-149-0x0000000000000000-mapping.dmp