Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2022 09:45
Static task
static1
Behavioral task
behavioral1
Sample
b01ddbf0bff46769347ba59495c22c6f.exe
Resource
win7-20220812-en
General
-
Target
b01ddbf0bff46769347ba59495c22c6f.exe
-
Size
3.4MB
-
MD5
b01ddbf0bff46769347ba59495c22c6f
-
SHA1
36bb6a7d67ebffb8dc2c903d20594141436de37e
-
SHA256
6622ecf695d6546c9ce99134a13c485d33691905b4140ca5fbe6d704948cf651
-
SHA512
6f05570e01fcf9511626cd7d85bc20a32ebd7d9fdd49b52de80ee4ec20fb3f34880a07d0758543630c02b93484e501824a4f0df3bebf6c9b30fb24fc87f16f96
-
SSDEEP
98304:Mh0ywRz70/W9+68ZBtKe3oWFGNc+sA5loQwMEp+ou/Xf:nyf/W9+DfFGNv5lnEMosf
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
Processes:
b01ddbf0bff46769347ba59495c22c6f.exedescription pid process target process PID 3812 created 3080 3812 b01ddbf0bff46769347ba59495c22c6f.exe Explorer.EXE PID 3812 created 3080 3812 b01ddbf0bff46769347ba59495c22c6f.exe Explorer.EXE PID 3812 created 3080 3812 b01ddbf0bff46769347ba59495c22c6f.exe Explorer.EXE -
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4920-142-0x00007FF74C0B0000-0x00007FF74C8A4000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/4920-139-0x00007FF74C0B0000-0x00007FF74C8A4000-memory.dmp upx behavioral2/memory/4920-142-0x00007FF74C0B0000-0x00007FF74C8A4000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b01ddbf0bff46769347ba59495c22c6f.exedescription pid process target process PID 3812 set thread context of 4920 3812 b01ddbf0bff46769347ba59495c22c6f.exe dwm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b01ddbf0bff46769347ba59495c22c6f.exedwm.exepid process 3812 b01ddbf0bff46769347ba59495c22c6f.exe 3812 b01ddbf0bff46769347ba59495c22c6f.exe 3812 b01ddbf0bff46769347ba59495c22c6f.exe 3812 b01ddbf0bff46769347ba59495c22c6f.exe 3812 b01ddbf0bff46769347ba59495c22c6f.exe 3812 b01ddbf0bff46769347ba59495c22c6f.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 668 -
Suspicious use of AdjustPrivilegeToken 52 IoCs
Processes:
powercfg.exeWMIC.exepowercfg.exepowercfg.exepowercfg.exedwm.exedescription pid process Token: SeShutdownPrivilege 4284 powercfg.exe Token: SeCreatePagefilePrivilege 4284 powercfg.exe Token: SeIncreaseQuotaPrivilege 2500 WMIC.exe Token: SeSecurityPrivilege 2500 WMIC.exe Token: SeTakeOwnershipPrivilege 2500 WMIC.exe Token: SeLoadDriverPrivilege 2500 WMIC.exe Token: SeSystemProfilePrivilege 2500 WMIC.exe Token: SeSystemtimePrivilege 2500 WMIC.exe Token: SeProfSingleProcessPrivilege 2500 WMIC.exe Token: SeIncBasePriorityPrivilege 2500 WMIC.exe Token: SeCreatePagefilePrivilege 2500 WMIC.exe Token: SeBackupPrivilege 2500 WMIC.exe Token: SeRestorePrivilege 2500 WMIC.exe Token: SeShutdownPrivilege 2500 WMIC.exe Token: SeDebugPrivilege 2500 WMIC.exe Token: SeSystemEnvironmentPrivilege 2500 WMIC.exe Token: SeRemoteShutdownPrivilege 2500 WMIC.exe Token: SeUndockPrivilege 2500 WMIC.exe Token: SeManageVolumePrivilege 2500 WMIC.exe Token: 33 2500 WMIC.exe Token: 34 2500 WMIC.exe Token: 35 2500 WMIC.exe Token: 36 2500 WMIC.exe Token: SeShutdownPrivilege 3452 powercfg.exe Token: SeCreatePagefilePrivilege 3452 powercfg.exe Token: SeShutdownPrivilege 4584 powercfg.exe Token: SeCreatePagefilePrivilege 4584 powercfg.exe Token: SeIncreaseQuotaPrivilege 2500 WMIC.exe Token: SeSecurityPrivilege 2500 WMIC.exe Token: SeTakeOwnershipPrivilege 2500 WMIC.exe Token: SeLoadDriverPrivilege 2500 WMIC.exe Token: SeSystemProfilePrivilege 2500 WMIC.exe Token: SeSystemtimePrivilege 2500 WMIC.exe Token: SeProfSingleProcessPrivilege 2500 WMIC.exe Token: SeIncBasePriorityPrivilege 2500 WMIC.exe Token: SeCreatePagefilePrivilege 2500 WMIC.exe Token: SeBackupPrivilege 2500 WMIC.exe Token: SeRestorePrivilege 2500 WMIC.exe Token: SeShutdownPrivilege 2500 WMIC.exe Token: SeDebugPrivilege 2500 WMIC.exe Token: SeSystemEnvironmentPrivilege 2500 WMIC.exe Token: SeRemoteShutdownPrivilege 2500 WMIC.exe Token: SeUndockPrivilege 2500 WMIC.exe Token: SeManageVolumePrivilege 2500 WMIC.exe Token: 33 2500 WMIC.exe Token: 34 2500 WMIC.exe Token: 35 2500 WMIC.exe Token: 36 2500 WMIC.exe Token: SeShutdownPrivilege 3548 powercfg.exe Token: SeCreatePagefilePrivilege 3548 powercfg.exe Token: SeLockMemoryPrivilege 4920 dwm.exe Token: SeLockMemoryPrivilege 4920 dwm.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
Processes:
dwm.exepid process 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe -
Suspicious use of SendNotifyMessage 63 IoCs
Processes:
dwm.exepid process 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
cmd.execmd.exeb01ddbf0bff46769347ba59495c22c6f.exedescription pid process target process PID 4852 wrote to memory of 4284 4852 cmd.exe powercfg.exe PID 4852 wrote to memory of 4284 4852 cmd.exe powercfg.exe PID 3584 wrote to memory of 2500 3584 cmd.exe WMIC.exe PID 3584 wrote to memory of 2500 3584 cmd.exe WMIC.exe PID 4852 wrote to memory of 3452 4852 cmd.exe powercfg.exe PID 4852 wrote to memory of 3452 4852 cmd.exe powercfg.exe PID 4852 wrote to memory of 4584 4852 cmd.exe powercfg.exe PID 4852 wrote to memory of 4584 4852 cmd.exe powercfg.exe PID 4852 wrote to memory of 3548 4852 cmd.exe powercfg.exe PID 4852 wrote to memory of 3548 4852 cmd.exe powercfg.exe PID 3812 wrote to memory of 4920 3812 b01ddbf0bff46769347ba59495c22c6f.exe dwm.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\b01ddbf0bff46769347ba59495c22c6f.exe"C:\Users\Admin\AppData\Local\Temp\b01ddbf0bff46769347ba59495c22c6f.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe ilomnyjxaqxbdyoj 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2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Google\Libs\g.logFilesize
226B
MD5fdba80d4081c28c65e32fff246dc46cb
SHA174f809dedd1fc46a3a63ac9904c80f0b817b3686
SHA256b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398
SHA512b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29
-
memory/2500-133-0x0000000000000000-mapping.dmp
-
memory/3452-134-0x0000000000000000-mapping.dmp
-
memory/3548-136-0x0000000000000000-mapping.dmp
-
memory/4284-132-0x0000000000000000-mapping.dmp
-
memory/4584-135-0x0000000000000000-mapping.dmp
-
memory/4920-138-0x00007FF74C8A2120-mapping.dmp
-
memory/4920-139-0x00007FF74C0B0000-0x00007FF74C8A4000-memory.dmpFilesize
8.0MB
-
memory/4920-140-0x000001D1BBDE0000-0x000001D1BBE00000-memory.dmpFilesize
128KB
-
memory/4920-141-0x000001D1BBFF0000-0x000001D1BC030000-memory.dmpFilesize
256KB
-
memory/4920-142-0x00007FF74C0B0000-0x00007FF74C8A4000-memory.dmpFilesize
8.0MB
-
memory/4920-143-0x000001D1BC080000-0x000001D1BC0A0000-memory.dmpFilesize
128KB
-
memory/4920-144-0x000001D1BC080000-0x000001D1BC0A0000-memory.dmpFilesize
128KB
-
memory/4920-145-0x000001D1BC080000-0x000001D1BC0A0000-memory.dmpFilesize
128KB
-
memory/4920-146-0x000001D1BC0B0000-0x000001D1BC0D0000-memory.dmpFilesize
128KB