Analysis
-
max time kernel
1201s -
max time network
1207s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:41
Static task
static1
Behavioral task
behavioral1
Sample
032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe
Resource
win10v2004-20220812-en
General
-
Target
032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe
-
Size
6.8MB
-
MD5
a5cc0738a563489458f6541c3d3dc722
-
SHA1
c4647225139bfde320f51f7af5751c33930f3787
-
SHA256
032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe
-
SHA512
3239e0fedecb92738fed530822bbe5b49c011cd425f162c2032df068ce676cb6286b1d2eb3d7711d090e5014228d1cf021410ff7d3351e81acbf1d046ab02537
-
SSDEEP
196608:WIQ9gu6aCQeL7fgzVwu4UN6KB3/0V61S+I:WIsp6axeLCIE6QyIvI
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\dllhostex.exe xmrig C:\Windows\SysWOW64\dllhostex.exe xmrig -
Executes dropped EXE 3 IoCs
Processes:
dllhostex.exeTaskIndexer.exeWUDHostServices.exepid process 1456 dllhostex.exe 1740 TaskIndexer.exe 1764 WUDHostServices.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\RemoteRPCEvent\Parameters\ServiceDll = "C:\\Windows\\system32\\RemoteRPCEvent.dll" 032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 3144 svchost.exe -
Drops file in System32 directory 10 IoCs
Processes:
032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exesvchost.exeTaskIndexer.exedescription ioc process File created C:\Windows\SysWOW64\msvcubn.nls 032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe File opened for modification C:\Windows\SysWOW64\msvcubn.nls 032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe File opened for modification C:\Windows\SysWOW64\TaskIndexer.exe svchost.exe File created C:\Windows\SysWOW64\text.log 032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe File created C:\Windows\SysWOW64\RemoteRPCEvent.dll 032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe File opened for modification C:\Windows\SysWOW64\RemoteRPCEvent.dll 032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe File created C:\Windows\SysWOW64\dllhostex.exe svchost.exe File opened for modification C:\Windows\SysWOW64\dllhostex.exe svchost.exe File created C:\Windows\SysWOW64\TaskIndexer.exe svchost.exe File created C:\Windows\SysWOW64\WUDHostServices.exe TaskIndexer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 3144 set thread context of 4316 3144 svchost.exe dllhost.exe -
Drops file in Windows directory 59 IoCs
Processes:
TaskIndexer.exedescription ioc process File created C:\Windows\NetworkDistribution\dmgd-4.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\esco-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\exma.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\tucl-1.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\exma-1.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\ssleay32.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\pcrecpp-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\spoolsv.xml TaskIndexer.exe File created C:\Windows\NetworkDistribution\tibe-1.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\x64.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\adfw.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\riar-2.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\riar.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\etebCore-2.x64.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\zlib1.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\cnli-1.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\etch-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\etchCore-0.x64.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\libcurl.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\trch.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\xdvl-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\zibe.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\Diagnostics.txt TaskIndexer.exe File created C:\Windows\NetworkDistribution\cnli-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\dmgd-1.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\libxml2.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\tibe.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\iconv.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\x86.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\adfw-2.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\Eternalblue-2.2.0.fb TaskIndexer.exe File created C:\Windows\NetworkDistribution\libiconv-2.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\pcreposix-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\tucl.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\pytrch.pyc TaskIndexer.exe File created C:\Windows\NetworkDistribution\trfo-2.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\_pytrch.pyd TaskIndexer.exe File created C:\Windows\NetworkDistribution\coli-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\libeay32.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\out.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\pcla-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\pcre-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\posh.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\tibe-2.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\ucl.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\etchCore-0.x86.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\spoolsv.exe TaskIndexer.exe File created C:\Windows\NetworkDistribution\svchost.xml TaskIndexer.exe File created C:\Windows\NetworkDistribution\trch-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\trfo-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\trfo.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\eteb-2.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\posh-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\trch-1.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\crli-0.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\etebCore-2.x86.dll TaskIndexer.exe File created C:\Windows\NetworkDistribution\Eternalchampion-2.0.0.fb TaskIndexer.exe File created C:\Windows\NetworkDistribution\pytrch.py TaskIndexer.exe File created C:\Windows\NetworkDistribution\svchost.exe TaskIndexer.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe 3144 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dllhostex.exeWUDHostServices.exedescription pid process Token: SeLockMemoryPrivilege 1456 dllhostex.exe Token: SeDebugPrivilege 1764 WUDHostServices.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
svchost.exe032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.execmd.exeTaskIndexer.exedescription pid process target process PID 3144 wrote to memory of 4868 3144 svchost.exe schtasks.exe PID 3144 wrote to memory of 4868 3144 svchost.exe schtasks.exe PID 3144 wrote to memory of 4868 3144 svchost.exe schtasks.exe PID 3144 wrote to memory of 1264 3144 svchost.exe schtasks.exe PID 3144 wrote to memory of 1264 3144 svchost.exe schtasks.exe PID 3144 wrote to memory of 1264 3144 svchost.exe schtasks.exe PID 3460 wrote to memory of 4940 3460 032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe cmd.exe PID 3460 wrote to memory of 4940 3460 032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe cmd.exe PID 3460 wrote to memory of 4940 3460 032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe cmd.exe PID 4940 wrote to memory of 1132 4940 cmd.exe PING.EXE PID 4940 wrote to memory of 1132 4940 cmd.exe PING.EXE PID 4940 wrote to memory of 1132 4940 cmd.exe PING.EXE PID 4940 wrote to memory of 3336 4940 cmd.exe cmd.exe PID 4940 wrote to memory of 3336 4940 cmd.exe cmd.exe PID 4940 wrote to memory of 3336 4940 cmd.exe cmd.exe PID 3144 wrote to memory of 4316 3144 svchost.exe dllhost.exe PID 3144 wrote to memory of 4316 3144 svchost.exe dllhost.exe PID 3144 wrote to memory of 4316 3144 svchost.exe dllhost.exe PID 3144 wrote to memory of 4316 3144 svchost.exe dllhost.exe PID 3144 wrote to memory of 1456 3144 svchost.exe dllhostex.exe PID 3144 wrote to memory of 1456 3144 svchost.exe dllhostex.exe PID 3144 wrote to memory of 1456 3144 svchost.exe dllhostex.exe PID 3144 wrote to memory of 4316 3144 svchost.exe dllhost.exe PID 3144 wrote to memory of 1740 3144 svchost.exe TaskIndexer.exe PID 3144 wrote to memory of 1740 3144 svchost.exe TaskIndexer.exe PID 3144 wrote to memory of 1740 3144 svchost.exe TaskIndexer.exe PID 1740 wrote to memory of 1764 1740 TaskIndexer.exe WUDHostServices.exe PID 1740 wrote to memory of 1764 1740 TaskIndexer.exe WUDHostServices.exe PID 1740 wrote to memory of 1764 1740 TaskIndexer.exe WUDHostServices.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe"C:\Users\Admin\AppData\Local\Temp\032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 5 & cmd.exe /c del /a /f "C:\Users\Admin\AppData\Local\Temp\032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del /a /f "C:\Users\Admin\AppData\Local\Temp\032f2e845d2b9832c7845bc6a7de650ee2148891c8ee442fe3f3a8478e588dbe.exe"3⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/End /TN "\Microsoft\Windows\UPnP\RpcPolicyHost"2⤵
-
C:\Windows\SysWOW64\schtasks.exe/Delete /TN "\Microsoft\Windows\UPnP\RpcPolicyHost" /F2⤵
-
C:\Windows\SysWOW64\dllhost.exeC:\Windows\system32\dllhost.exe2⤵
-
C:\Windows\SysWOW64\dllhostex.exe"C:\Windows\system32\dllhostex.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TaskIndexer.exe"C:\Windows\system32\TaskIndexer.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WUDHostServices.exe"C:\Windows\system32\WUDHostServices.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\RemoteRPCEvent.dllFilesize
106KB
MD51b24ee642dfec6571593572ca1fcc3bf
SHA1e48a76c939c7b0bbefdaaa4f2acdce28f055bded
SHA25688d534bc3e21fb26546e5fc0b228b9dddd44981184b27f686f87e958c4f6976d
SHA51243ab384be9eff955c7e9191886857946490e69ba818f566a28934092467a42577720dd8a19464c292031590545e0b0bb6bd130c536f5717120611ce70639128d
-
C:\Windows\SysWOW64\TaskIndexer.exeFilesize
322KB
MD5de48b20faf52987aafa1c95d6249bb2a
SHA1411096f531f7018f15014e6cc7c27f0ce50798b1
SHA2562190b455d68a372eef870b4b967d49e2f17b26cdcbe307fd46d27de9f99c17fe
SHA5126b1f2b0344eebdd68ad19db3d7dda38371b0d336360e583154fd676b84d22355296ed19180b5b468625b3d8f81dd3de4530072fdac5de962ca0b143d15e33a26
-
C:\Windows\SysWOW64\TaskIndexer.exeFilesize
322KB
MD5de48b20faf52987aafa1c95d6249bb2a
SHA1411096f531f7018f15014e6cc7c27f0ce50798b1
SHA2562190b455d68a372eef870b4b967d49e2f17b26cdcbe307fd46d27de9f99c17fe
SHA5126b1f2b0344eebdd68ad19db3d7dda38371b0d336360e583154fd676b84d22355296ed19180b5b468625b3d8f81dd3de4530072fdac5de962ca0b143d15e33a26
-
C:\Windows\SysWOW64\WUDHostServices.exeFilesize
46KB
MD5fc7880429d850789e40808d1ab45c119
SHA19d6bb1bc89bac653ae4d40107bbed6e07551d8ee
SHA256c71623b62590e904e77f597b9f956a6f6a7b266206a75ddac3fd91d86652e55d
SHA512bad391f5d0b014bfcb43015ac5e789e55b4492114516f09c4ecd1023470ad97ab824f929f4b9ce97da56c55f7f94d82e0c9319488bdfd1e5b6834a8da31525b4
-
C:\Windows\SysWOW64\WUDHostServices.exeFilesize
46KB
MD5fc7880429d850789e40808d1ab45c119
SHA19d6bb1bc89bac653ae4d40107bbed6e07551d8ee
SHA256c71623b62590e904e77f597b9f956a6f6a7b266206a75ddac3fd91d86652e55d
SHA512bad391f5d0b014bfcb43015ac5e789e55b4492114516f09c4ecd1023470ad97ab824f929f4b9ce97da56c55f7f94d82e0c9319488bdfd1e5b6834a8da31525b4
-
C:\Windows\SysWOW64\dllhostex.exeFilesize
1.3MB
MD59d31226e4e5e486c0ad4f904405c3592
SHA1c54ae00c31c3e417ce68e7405f66c2d6e9e4ab98
SHA25695415e1067177a7e0409904231f503c8684d26b55c0dfe632053ce304aaf3354
SHA512bb3a82aa72d66e9581b174397f7ae1681465dafd3a85defe3bdafbd83a62740c1c866441dcda69ccfa39a3015682e02df99111e6ae6338edaa9c731dfb875e08
-
C:\Windows\SysWOW64\dllhostex.exeFilesize
1.3MB
MD59d31226e4e5e486c0ad4f904405c3592
SHA1c54ae00c31c3e417ce68e7405f66c2d6e9e4ab98
SHA25695415e1067177a7e0409904231f503c8684d26b55c0dfe632053ce304aaf3354
SHA512bb3a82aa72d66e9581b174397f7ae1681465dafd3a85defe3bdafbd83a62740c1c866441dcda69ccfa39a3015682e02df99111e6ae6338edaa9c731dfb875e08
-
C:\Windows\SysWOW64\msvcubn.nlsFilesize
6.7MB
MD52fffb3077a386cd27259ac7a4957e1d6
SHA1022d49e632b2996e955d4eebf360245c65a59093
SHA2566790df7aa6bc871da4c62af4db9555de3de3b4813a0df374b11f70df81fbccdb
SHA51266ae49ed96d4ac304f05a5ed1f1d6ac1b021c02045fcd94ded3a3506c3eef146db835622133eb13baa4b96799665acde98be0f624b29f0d6dfc6c1f09a95ab5b
-
\??\c:\windows\SysWOW64\remoterpcevent.dllFilesize
106KB
MD51b24ee642dfec6571593572ca1fcc3bf
SHA1e48a76c939c7b0bbefdaaa4f2acdce28f055bded
SHA25688d534bc3e21fb26546e5fc0b228b9dddd44981184b27f686f87e958c4f6976d
SHA51243ab384be9eff955c7e9191886857946490e69ba818f566a28934092467a42577720dd8a19464c292031590545e0b0bb6bd130c536f5717120611ce70639128d
-
memory/1132-145-0x0000000000000000-mapping.dmp
-
memory/1264-143-0x0000000000000000-mapping.dmp
-
memory/1456-151-0x0000000000000000-mapping.dmp
-
memory/1740-155-0x0000000000000000-mapping.dmp
-
memory/1764-158-0x0000000000000000-mapping.dmp
-
memory/3144-146-0x0000000001900000-0x0000000001926000-memory.dmpFilesize
152KB
-
memory/3144-139-0x0000000000DE0000-0x0000000000DFD000-memory.dmpFilesize
116KB
-
memory/3144-148-0x0000000001560000-0x0000000001598000-memory.dmpFilesize
224KB
-
memory/3144-135-0x0000000001560000-0x0000000001598000-memory.dmpFilesize
224KB
-
memory/3144-136-0x0000000000DE0000-0x0000000000DFD000-memory.dmpFilesize
116KB
-
memory/3144-142-0x00000000015E0000-0x00000000015FF000-memory.dmpFilesize
124KB
-
memory/3144-137-0x00000000015E0000-0x00000000015FF000-memory.dmpFilesize
124KB
-
memory/3144-138-0x0000000001900000-0x0000000001926000-memory.dmpFilesize
152KB
-
memory/3144-140-0x0000000001560000-0x0000000001598000-memory.dmpFilesize
224KB
-
memory/3336-147-0x0000000000000000-mapping.dmp
-
memory/4316-153-0x0000000000330000-0x0000000000383000-memory.dmpFilesize
332KB
-
memory/4316-150-0x0000000000330000-0x0000000000383000-memory.dmpFilesize
332KB
-
memory/4316-149-0x0000000000000000-mapping.dmp
-
memory/4868-141-0x0000000000000000-mapping.dmp
-
memory/4940-144-0x0000000000000000-mapping.dmp