Analysis
-
max time kernel
1791s -
max time network
1792s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2023, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
test13.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
test13.exe
Resource
win7-20230220-en
General
-
Target
test13.exe
-
Size
5.6MB
-
MD5
dd6511650167bd50c8baf3c321d68cd7
-
SHA1
b7a0cf91f251935969e75628c080bf38f694e6c6
-
SHA256
add2fd5a3d7d4280c417a6a195fcdca9fbf834329b644f9d84423f2413ac2d85
-
SHA512
da4ca577eaf56b2d459549156c89213d20cce9e2d2c24003a35e7f0753398dc4538d508cf276adedbc635808bec6ffd61b2c94a881ecbc6a66c5911e24d4a32c
-
SSDEEP
98304:tR4QavOFDCN/Li9/oDsBaSnEolKi8JBoazSzZMrq7g2FWO2kBcQf41/9UMbKTurd:tnaEDCNOp5EolKi8JTS2wg2FWO2kP41R
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 1060 created 1240 1060 test13.exe 17 PID 1060 created 1240 1060 test13.exe 17 PID 1060 created 1240 1060 test13.exe 17 PID 1596 created 1240 1596 updater.exe 17 PID 1596 created 1240 1596 updater.exe 17 PID 1596 created 1240 1596 updater.exe 17 PID 1596 created 1240 1596 updater.exe 17 -
XMRig Miner payload 31 IoCs
resource yara_rule behavioral2/memory/1596-82-0x000000013F870000-0x000000013FE0A000-memory.dmp xmrig behavioral2/memory/1564-87-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-91-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-93-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-95-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-97-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-99-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-101-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-103-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-105-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-107-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-109-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-111-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-113-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-115-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-117-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-119-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-121-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-123-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-125-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-127-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-129-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-131-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-133-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-135-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-137-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-139-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-141-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-143-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-145-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral2/memory/1564-147-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 1596 updater.exe -
Loads dropped DLL 1 IoCs
pid Process 816 taskeng.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1596 set thread context of 1880 1596 updater.exe 50 PID 1596 set thread context of 1564 1596 updater.exe 51 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 628 schtasks.exe 1872 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1060 test13.exe 1060 test13.exe 1060 test13.exe 1060 test13.exe 1728 powershell.exe 1060 test13.exe 1060 test13.exe 1596 updater.exe 1596 updater.exe 1596 updater.exe 1596 updater.exe 1052 powershell.exe 1596 updater.exe 1596 updater.exe 1596 updater.exe 1596 updater.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1752 powercfg.exe Token: SeShutdownPrivilege 760 powercfg.exe Token: SeShutdownPrivilege 1268 powercfg.exe Token: SeDebugPrivilege 1728 powershell.exe Token: SeShutdownPrivilege 832 powercfg.exe Token: SeShutdownPrivilege 1532 powercfg.exe Token: SeShutdownPrivilege 1236 powercfg.exe Token: SeShutdownPrivilege 1948 powercfg.exe Token: SeDebugPrivilege 1052 powershell.exe Token: SeShutdownPrivilege 1180 powercfg.exe Token: SeLockMemoryPrivilege 1564 explorer.exe Token: SeLockMemoryPrivilege 1564 explorer.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1752 1248 cmd.exe 32 PID 1248 wrote to memory of 1752 1248 cmd.exe 32 PID 1248 wrote to memory of 1752 1248 cmd.exe 32 PID 1248 wrote to memory of 760 1248 cmd.exe 33 PID 1248 wrote to memory of 760 1248 cmd.exe 33 PID 1248 wrote to memory of 760 1248 cmd.exe 33 PID 1248 wrote to memory of 1268 1248 cmd.exe 34 PID 1248 wrote to memory of 1268 1248 cmd.exe 34 PID 1248 wrote to memory of 1268 1248 cmd.exe 34 PID 1248 wrote to memory of 832 1248 cmd.exe 35 PID 1248 wrote to memory of 832 1248 cmd.exe 35 PID 1248 wrote to memory of 832 1248 cmd.exe 35 PID 1728 wrote to memory of 628 1728 powershell.exe 36 PID 1728 wrote to memory of 628 1728 powershell.exe 36 PID 1728 wrote to memory of 628 1728 powershell.exe 36 PID 816 wrote to memory of 1596 816 taskeng.exe 40 PID 816 wrote to memory of 1596 816 taskeng.exe 40 PID 816 wrote to memory of 1596 816 taskeng.exe 40 PID 1328 wrote to memory of 1532 1328 cmd.exe 45 PID 1328 wrote to memory of 1532 1328 cmd.exe 45 PID 1328 wrote to memory of 1532 1328 cmd.exe 45 PID 1328 wrote to memory of 1236 1328 cmd.exe 46 PID 1328 wrote to memory of 1236 1328 cmd.exe 46 PID 1328 wrote to memory of 1236 1328 cmd.exe 46 PID 1328 wrote to memory of 1948 1328 cmd.exe 47 PID 1328 wrote to memory of 1948 1328 cmd.exe 47 PID 1328 wrote to memory of 1948 1328 cmd.exe 47 PID 1328 wrote to memory of 1180 1328 cmd.exe 48 PID 1328 wrote to memory of 1180 1328 cmd.exe 48 PID 1328 wrote to memory of 1180 1328 cmd.exe 48 PID 1052 wrote to memory of 1872 1052 powershell.exe 49 PID 1052 wrote to memory of 1872 1052 powershell.exe 49 PID 1052 wrote to memory of 1872 1052 powershell.exe 49 PID 1596 wrote to memory of 1880 1596 updater.exe 50 PID 1596 wrote to memory of 1564 1596 updater.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\test13.exe"C:\Users\Admin\AppData\Local\Temp\test13.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#efgylltc#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'3⤵
- Creates scheduled task(s)
PID:628
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:1980
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#efgylltc#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'3⤵
- Creates scheduled task(s)
PID:1872
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1880
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A9BF9BF-20F7-4D14-9CAD-567FD5176D3D} S-1-5-21-1283023626-844874658-3193756055-1000:THEQWNRW\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1596
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD5dd6511650167bd50c8baf3c321d68cd7
SHA1b7a0cf91f251935969e75628c080bf38f694e6c6
SHA256add2fd5a3d7d4280c417a6a195fcdca9fbf834329b644f9d84423f2413ac2d85
SHA512da4ca577eaf56b2d459549156c89213d20cce9e2d2c24003a35e7f0753398dc4538d508cf276adedbc635808bec6ffd61b2c94a881ecbc6a66c5911e24d4a32c
-
Filesize
5.6MB
MD5dd6511650167bd50c8baf3c321d68cd7
SHA1b7a0cf91f251935969e75628c080bf38f694e6c6
SHA256add2fd5a3d7d4280c417a6a195fcdca9fbf834329b644f9d84423f2413ac2d85
SHA512da4ca577eaf56b2d459549156c89213d20cce9e2d2c24003a35e7f0753398dc4538d508cf276adedbc635808bec6ffd61b2c94a881ecbc6a66c5911e24d4a32c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50d620ee964d8c8c2c25cb37c35cb8d3b
SHA12f1270a4e9815622ee5a7db0060c9ebc01919fd6
SHA2569f695b1968d7922e5e8d8ed6a65835361d5301d6f74465d1e3379b6f1e95ed51
SHA512067832e6d7e5789539a90413ea3f965b4ebc6654cce296b85d7771de605343cb6c9069695dddeb1b19ffd86ab9dbc0e883665b48ca0990cd472d5a5d47700c31
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DLXP89VDJKQQ9SAOEW1D.temp
Filesize7KB
MD50d620ee964d8c8c2c25cb37c35cb8d3b
SHA12f1270a4e9815622ee5a7db0060c9ebc01919fd6
SHA2569f695b1968d7922e5e8d8ed6a65835361d5301d6f74465d1e3379b6f1e95ed51
SHA512067832e6d7e5789539a90413ea3f965b4ebc6654cce296b85d7771de605343cb6c9069695dddeb1b19ffd86ab9dbc0e883665b48ca0990cd472d5a5d47700c31
-
Filesize
5.6MB
MD5dd6511650167bd50c8baf3c321d68cd7
SHA1b7a0cf91f251935969e75628c080bf38f694e6c6
SHA256add2fd5a3d7d4280c417a6a195fcdca9fbf834329b644f9d84423f2413ac2d85
SHA512da4ca577eaf56b2d459549156c89213d20cce9e2d2c24003a35e7f0753398dc4538d508cf276adedbc635808bec6ffd61b2c94a881ecbc6a66c5911e24d4a32c