Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-06-2023 06:18
Static task
static1
Behavioral task
behavioral1
Sample
7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe
Resource
win7-20230220-en
General
-
Target
7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe
-
Size
508KB
-
MD5
223fa5bc526acf4e31c21f1eacf08f23
-
SHA1
0297e7e9934185150f98f20d5c59e481fb01a817
-
SHA256
7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22
-
SHA512
24861dbf9e719b5b67d3fd7a606135fa7daeaa907bbcaf3f670eebbd551da63762588281fdd57e1a9d863efa702fd806defd0a295c258100c90324ae61b3460f
-
SSDEEP
12288:Z8DSlNIUS3uqIUOjtZlPM18xIR0VhhSePmAUbqS2tn5PAhCJgyDX:wwOUSeqOjhi28pNbqSSmsv
Malware Config
Signatures
-
XMRig Miner payload 22 IoCs
resource yara_rule behavioral1/memory/4024-139-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-140-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-141-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-142-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-143-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-144-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-145-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-147-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-148-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-150-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-151-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-152-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-153-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-154-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-155-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-158-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-159-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-161-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-162-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-163-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-164-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig behavioral1/memory/4024-165-0x0000000140000000-0x00000001407C3000-memory.dmp xmrig -
Blocklisted process makes network request 3 IoCs
flow pid Process 9 4992 msiexec.exe 14 4992 msiexec.exe 15 4992 msiexec.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xBACBDGIJIKJ.exe msiexec.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xBACBDGIJIKJ.exe msiexec.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4048 set thread context of 4992 4048 7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe 66 PID 4992 set thread context of 4024 4992 msiexec.exe 67 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4992 msiexec.exe 4992 msiexec.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4992 msiexec.exe Token: SeLockMemoryPrivilege 4024 MusNotificationUx.exe Token: SeLockMemoryPrivilege 4024 MusNotificationUx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4024 MusNotificationUx.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4992 4048 7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe 66 PID 4048 wrote to memory of 4992 4048 7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe 66 PID 4048 wrote to memory of 4992 4048 7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe 66 PID 4048 wrote to memory of 4992 4048 7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe 66 PID 4048 wrote to memory of 4992 4048 7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe 66 PID 4048 wrote to memory of 4992 4048 7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe 66 PID 4048 wrote to memory of 4992 4048 7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe 66 PID 4048 wrote to memory of 4992 4048 7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe 66 PID 4048 wrote to memory of 4992 4048 7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe 66 PID 4048 wrote to memory of 4992 4048 7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe 66 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67 PID 4992 wrote to memory of 4024 4992 msiexec.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe"C:\Users\Admin\AppData\Local\Temp\7660e27373eddbf82fee79ac5838842e96eb27f677a733a3dfc467f221f62c22.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe"2⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\system32\MusNotificationUx.exe"C:\Windows\system32\MusNotificationUx.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4024
-
-