Analysis

  • max time kernel
    301s
  • max time network
    282s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/12/2022, 22:40

General

  • Target

    97ded6f6cd27d350b54088294d10b471cb7caacd8b900e95ef78a6bebcc91bc9.exe

  • Size

    56KB

  • MD5

    93a8bd28a6dad78859808a3b4d3cf107

  • SHA1

    354e8696fd578e73061f670f91f6bd1579ddacf1

  • SHA256

    97ded6f6cd27d350b54088294d10b471cb7caacd8b900e95ef78a6bebcc91bc9

  • SHA512

    4fef9b319208036c92a182fbb3d356a2f2eac14eabdfa1fb1304b56654506ad7892a171ec97a0efbe43cd47f832d2ef437854bbd262112afc6ce966e886a824e

  • SSDEEP

    768:frKuHIjixyEdRiVWhExfZNbJ5NtTbZRX+6gV/EL4:TKuHm+yEnXCfZNN5/bZ5/gqc

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97ded6f6cd27d350b54088294d10b471cb7caacd8b900e95ef78a6bebcc91bc9.exe
    "C:\Users\Admin\AppData\Local\Temp\97ded6f6cd27d350b54088294d10b471cb7caacd8b900e95ef78a6bebcc91bc9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3256
      • C:\Windows\SysWOW64\chcp.com
        chcp 1251
        3⤵
          PID:3104
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4608
      • C:\ProgramData\Dllhost\dllhost.exe
        "C:\ProgramData\Dllhost\dllhost.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3680
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            4⤵
            • Creates scheduled task(s)
            PID:1620
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"
          3⤵
            PID:4228
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            3⤵
              PID:4260
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              3⤵
                PID:4300
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:5016
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  4⤵
                  • Creates scheduled task(s)
                  PID:2244
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:3232
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  4⤵
                  • Creates scheduled task(s)
                  PID:2312
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3005" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                3⤵
                  PID:3988
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3171" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1012
                  • C:\Windows\SysWOW64\schtasks.exe
                    SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3171" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                    4⤵
                    • Creates scheduled task(s)
                    PID:2292
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4548
                  • C:\Windows\SysWOW64\schtasks.exe
                    SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                    4⤵
                    • Creates scheduled task(s)
                    PID:1828
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  3⤵
                    PID:1372
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk1780" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                    3⤵
                      PID:5000
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5270" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                      3⤵
                        PID:5044
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json
                        3⤵
                          PID:2884
                          • C:\Windows\SysWOW64\chcp.com
                            chcp 1251
                            4⤵
                              PID:4616
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json
                            3⤵
                              PID:3640
                              • C:\Windows\SysWOW64\chcp.com
                                chcp 1251
                                4⤵
                                  PID:4916
                                • C:\ProgramData\Dllhost\winlogson.exe
                                  C:\ProgramData\Dllhost\winlogson.exe -c config.json
                                  4⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:4948

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\Dllhost\dllhost.exe

                            Filesize

                            60KB

                            MD5

                            8eac424b39ecd7724237708242536dce

                            SHA1

                            dbd058d840422fcaaf1d6897564e73be3641f7d3

                            SHA256

                            a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229

                            SHA512

                            1ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa

                          • C:\ProgramData\Dllhost\dllhost.exe

                            Filesize

                            60KB

                            MD5

                            8eac424b39ecd7724237708242536dce

                            SHA1

                            dbd058d840422fcaaf1d6897564e73be3641f7d3

                            SHA256

                            a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229

                            SHA512

                            1ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa

                          • C:\ProgramData\Dllhost\winlogson.exe

                            Filesize

                            7.8MB

                            MD5

                            6f4532e49d65c2be0355b222f96e06e8

                            SHA1

                            268e90ce25e01bbb205f6ae3f493f8da36a61480

                            SHA256

                            acaf8e844ef7f4f65033ebe9546c394cc21bce175dac8b59199106309f04e5ab

                            SHA512

                            85f495b0bbd0673df376f44e912f9a0a8d201c2843f1a9efa64d93703a2d8ba2b6fa2638a747e79604715d26ddfc07de26ba43d03adf86290d928b442bf09207

                          • C:\ProgramData\SystemFiles\config.json

                            Filesize

                            310B

                            MD5

                            aea3666ca9ce85cda48dde4d4037dafb

                            SHA1

                            0cd2e08c350e2f692a95f621a861a61ddc883d27

                            SHA256

                            3c5de1ade38c6857790fec477097f1aa1438e7400cfe5f422218d2b6ec5c50f3

                            SHA512

                            cd8926b5da72973931a7f8253e086c8aa1d6e9f1839072c71d54747278954792f7b5837231dc8a443e9da16695a7eefb0f2fe3cc5d58926c3ec162d7d7786647

                          • C:\ProgramData\SystemFiles\sys_rh.bin

                            Filesize

                            1KB

                            MD5

                            33a040d2940740ccd0fe09ee63a71420

                            SHA1

                            e7b386485ffdca5e24538acb6d9ce77f3cba044a

                            SHA256

                            5ba31918946a9a81a4f2308a12980b5695039a13297361dc193cd81b6d6c25d5

                            SHA512

                            5834b6c6402b2b6507eba3323ff7019662d6aa7a9839d2e2fe3241ae981ba11ac3a2692b496e5f0a6f0d49553f9cc665bd4f94a7c8cd828385468924720ccfba

                          • memory/2544-546-0x0000000001280000-0x0000000001286000-memory.dmp

                            Filesize

                            24KB

                          • memory/2544-529-0x0000000000BD0000-0x0000000000BE6000-memory.dmp

                            Filesize

                            88KB

                          • memory/2752-180-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-188-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-137-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-138-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-139-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-140-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-141-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-142-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-143-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-144-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-145-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-146-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-147-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-148-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-149-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-150-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-151-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-152-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-153-0x0000000000F60000-0x0000000000F74000-memory.dmp

                            Filesize

                            80KB

                          • memory/2752-154-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-155-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-156-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-157-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-158-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-159-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-160-0x00000000031F0000-0x00000000031F6000-memory.dmp

                            Filesize

                            24KB

                          • memory/2752-161-0x000000000A290000-0x000000000A78E000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/2752-162-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-163-0x0000000005AB0000-0x0000000005B42000-memory.dmp

                            Filesize

                            584KB

                          • memory/2752-164-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-165-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-166-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-167-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-168-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-169-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-170-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-171-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-172-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-173-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-174-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-175-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-176-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-177-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-178-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-179-0x00000000058C0000-0x00000000058CA000-memory.dmp

                            Filesize

                            40KB

                          • memory/2752-120-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-181-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-182-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-183-0x00000000067F0000-0x0000000006856000-memory.dmp

                            Filesize

                            408KB

                          • memory/2752-184-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-185-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-186-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-187-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-136-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-189-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-121-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-122-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-123-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-124-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-125-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-126-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-127-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-128-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-129-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-130-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-131-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-132-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-133-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-134-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/2752-135-0x0000000077710000-0x000000007789E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/4608-247-0x0000000007AF0000-0x0000000008118000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/4608-593-0x00000000089F0000-0x0000000008A0A000-memory.dmp

                            Filesize

                            104KB

                          • memory/4608-273-0x0000000008BB0000-0x0000000008BFB000-memory.dmp

                            Filesize

                            300KB

                          • memory/4608-323-0x0000000009890000-0x0000000009935000-memory.dmp

                            Filesize

                            660KB

                          • memory/4608-314-0x0000000009820000-0x000000000983E000-memory.dmp

                            Filesize

                            120KB

                          • memory/4608-271-0x0000000008590000-0x00000000085AC000-memory.dmp

                            Filesize

                            112KB

                          • memory/4608-650-0x00000000089E0000-0x00000000089E8000-memory.dmp

                            Filesize

                            32KB

                          • memory/4608-268-0x0000000008120000-0x0000000008470000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/4608-265-0x0000000007870000-0x00000000078D6000-memory.dmp

                            Filesize

                            408KB

                          • memory/4608-256-0x00000000077B0000-0x00000000077D2000-memory.dmp

                            Filesize

                            136KB

                          • memory/4608-313-0x0000000009840000-0x0000000009873000-memory.dmp

                            Filesize

                            204KB

                          • memory/4608-242-0x00000000051C0000-0x00000000051F6000-memory.dmp

                            Filesize

                            216KB

                          • memory/4608-327-0x0000000009D40000-0x0000000009DD4000-memory.dmp

                            Filesize

                            592KB

                          • memory/4608-286-0x00000000088C0000-0x0000000008936000-memory.dmp

                            Filesize

                            472KB

                          • memory/4948-874-0x00000275772C0000-0x00000275772E0000-memory.dmp

                            Filesize

                            128KB

                          • memory/4948-875-0x00000275772E0000-0x0000027577300000-memory.dmp

                            Filesize

                            128KB

                          • memory/4948-876-0x00000275772E0000-0x0000027577300000-memory.dmp

                            Filesize

                            128KB