Analysis

  • max time kernel
    1791s
  • max time network
    1792s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2023, 12:28

General

  • Target

    test13.exe

  • Size

    5.6MB

  • MD5

    dd6511650167bd50c8baf3c321d68cd7

  • SHA1

    b7a0cf91f251935969e75628c080bf38f694e6c6

  • SHA256

    add2fd5a3d7d4280c417a6a195fcdca9fbf834329b644f9d84423f2413ac2d85

  • SHA512

    da4ca577eaf56b2d459549156c89213d20cce9e2d2c24003a35e7f0753398dc4538d508cf276adedbc635808bec6ffd61b2c94a881ecbc6a66c5911e24d4a32c

  • SSDEEP

    98304:tR4QavOFDCN/Li9/oDsBaSnEolKi8JBoazSzZMrq7g2FWO2kBcQf41/9UMbKTurd:tnaEDCNOp5EolKi8JTS2wg2FWO2kP41R

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 31 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1240
      • C:\Users\Admin\AppData\Local\Temp\test13.exe
        "C:\Users\Admin\AppData\Local\Temp\test13.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        PID:1060
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1752
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:760
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1268
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:832
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#efgylltc#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'
          3⤵
          • Creates scheduled task(s)
          PID:628
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
        2⤵
          PID:1980
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1328
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-ac 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1532
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-dc 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1236
          • C:\Windows\System32\powercfg.exe
            powercfg /x -standby-timeout-ac 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1948
          • C:\Windows\System32\powercfg.exe
            powercfg /x -standby-timeout-dc 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1180
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#efgylltc#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
          2⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1052
          • C:\Windows\system32\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'
            3⤵
            • Creates scheduled task(s)
            PID:1872
        • C:\Windows\System32\conhost.exe
          C:\Windows\System32\conhost.exe
          2⤵
            PID:1880
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1564
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {5A9BF9BF-20F7-4D14-9CAD-567FD5176D3D} S-1-5-21-1283023626-844874658-3193756055-1000:THEQWNRW\Admin:Interactive:[1]
          1⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:816
          • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
            C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1596

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

                Filesize

                5.6MB

                MD5

                dd6511650167bd50c8baf3c321d68cd7

                SHA1

                b7a0cf91f251935969e75628c080bf38f694e6c6

                SHA256

                add2fd5a3d7d4280c417a6a195fcdca9fbf834329b644f9d84423f2413ac2d85

                SHA512

                da4ca577eaf56b2d459549156c89213d20cce9e2d2c24003a35e7f0753398dc4538d508cf276adedbc635808bec6ffd61b2c94a881ecbc6a66c5911e24d4a32c

              • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

                Filesize

                5.6MB

                MD5

                dd6511650167bd50c8baf3c321d68cd7

                SHA1

                b7a0cf91f251935969e75628c080bf38f694e6c6

                SHA256

                add2fd5a3d7d4280c417a6a195fcdca9fbf834329b644f9d84423f2413ac2d85

                SHA512

                da4ca577eaf56b2d459549156c89213d20cce9e2d2c24003a35e7f0753398dc4538d508cf276adedbc635808bec6ffd61b2c94a881ecbc6a66c5911e24d4a32c

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                Filesize

                7KB

                MD5

                0d620ee964d8c8c2c25cb37c35cb8d3b

                SHA1

                2f1270a4e9815622ee5a7db0060c9ebc01919fd6

                SHA256

                9f695b1968d7922e5e8d8ed6a65835361d5301d6f74465d1e3379b6f1e95ed51

                SHA512

                067832e6d7e5789539a90413ea3f965b4ebc6654cce296b85d7771de605343cb6c9069695dddeb1b19ffd86ab9dbc0e883665b48ca0990cd472d5a5d47700c31

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DLXP89VDJKQQ9SAOEW1D.temp

                Filesize

                7KB

                MD5

                0d620ee964d8c8c2c25cb37c35cb8d3b

                SHA1

                2f1270a4e9815622ee5a7db0060c9ebc01919fd6

                SHA256

                9f695b1968d7922e5e8d8ed6a65835361d5301d6f74465d1e3379b6f1e95ed51

                SHA512

                067832e6d7e5789539a90413ea3f965b4ebc6654cce296b85d7771de605343cb6c9069695dddeb1b19ffd86ab9dbc0e883665b48ca0990cd472d5a5d47700c31

              • \Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

                Filesize

                5.6MB

                MD5

                dd6511650167bd50c8baf3c321d68cd7

                SHA1

                b7a0cf91f251935969e75628c080bf38f694e6c6

                SHA256

                add2fd5a3d7d4280c417a6a195fcdca9fbf834329b644f9d84423f2413ac2d85

                SHA512

                da4ca577eaf56b2d459549156c89213d20cce9e2d2c24003a35e7f0753398dc4538d508cf276adedbc635808bec6ffd61b2c94a881ecbc6a66c5911e24d4a32c

              • memory/1052-74-0x000000001B260000-0x000000001B542000-memory.dmp

                Filesize

                2.9MB

              • memory/1052-75-0x0000000001E70000-0x0000000001E78000-memory.dmp

                Filesize

                32KB

              • memory/1052-76-0x0000000002704000-0x0000000002707000-memory.dmp

                Filesize

                12KB

              • memory/1052-77-0x000000000270B000-0x0000000002742000-memory.dmp

                Filesize

                220KB

              • memory/1060-65-0x000000013FA90000-0x000000014002A000-memory.dmp

                Filesize

                5.6MB

              • memory/1564-93-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-103-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-147-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-84-0x0000000000430000-0x0000000000450000-memory.dmp

                Filesize

                128KB

              • memory/1564-85-0x00000000002B0000-0x00000000002D0000-memory.dmp

                Filesize

                128KB

              • memory/1564-145-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-143-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-141-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-139-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-137-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-135-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-87-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-88-0x0000000000430000-0x0000000000450000-memory.dmp

                Filesize

                128KB

              • memory/1564-89-0x00000000002B0000-0x00000000002D0000-memory.dmp

                Filesize

                128KB

              • memory/1564-133-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-91-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-131-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-95-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-97-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-99-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-101-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-83-0x00000000000B0000-0x00000000000D0000-memory.dmp

                Filesize

                128KB

              • memory/1564-105-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-107-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-109-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-111-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-113-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-115-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-117-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-119-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-121-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-123-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-125-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-127-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1564-129-0x0000000140000000-0x00000001407EF000-memory.dmp

                Filesize

                7.9MB

              • memory/1596-82-0x000000013F870000-0x000000013FE0A000-memory.dmp

                Filesize

                5.6MB

              • memory/1728-59-0x0000000002780000-0x0000000002800000-memory.dmp

                Filesize

                512KB

              • memory/1728-63-0x000000000278B000-0x00000000027C2000-memory.dmp

                Filesize

                220KB

              • memory/1728-62-0x0000000002784000-0x0000000002787000-memory.dmp

                Filesize

                12KB

              • memory/1728-60-0x0000000002780000-0x0000000002800000-memory.dmp

                Filesize

                512KB

              • memory/1728-61-0x0000000001DB0000-0x0000000001DB8000-memory.dmp

                Filesize

                32KB

              • memory/1728-58-0x000000001B090000-0x000000001B372000-memory.dmp

                Filesize

                2.9MB

              • memory/1880-90-0x0000000140000000-0x0000000140029000-memory.dmp

                Filesize

                164KB

              • memory/1880-86-0x0000000140000000-0x0000000140029000-memory.dmp

                Filesize

                164KB