Analysis

  • max time kernel
    241s
  • max time network
    310s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2023, 18:35

General

  • Target

    NEAS.c08838a78e5116db745813e83e290c40.exe

  • Size

    9.5MB

  • MD5

    c08838a78e5116db745813e83e290c40

  • SHA1

    10249da56d9b70b4cc4f3121ff1f26afbe8eec77

  • SHA256

    8cdb96d3f7eeda15bced1a55c47b5e0f099d62d1a26cfb5391d8fa5bbb10931e

  • SHA512

    8ee8357f09735f3ba23b530755e90db78522f2ba1fee9bfc39bb45f14d43e0f95d6fa861646bf2fd36cd261009b121c9ee7ba8b4d59fde810acd3ab992bbc708

  • SSDEEP

    196608:9YDr7lcBxr/DB5PrZxFatc5bLv5N+XVGJgkfLJJqyZiZybQ/79zsbCVhspxi:9YoDzFhVN+8xJqyZ6b/hs7px

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 14 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\NEAS.c08838a78e5116db745813e83e290c40.exe
        "C:\Users\Admin\AppData\Local\Temp\NEAS.c08838a78e5116db745813e83e290c40.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in Drivers directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:2724
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2776
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Windows\System32\sc.exe
          sc stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:1760
        • C:\Windows\System32\sc.exe
          sc stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:2500
        • C:\Windows\System32\sc.exe
          sc stop wuauserv
          3⤵
          • Launches sc.exe
          PID:1964
        • C:\Windows\System32\sc.exe
          sc stop bits
          3⤵
          • Launches sc.exe
          PID:2704
        • C:\Windows\System32\sc.exe
          sc stop dosvc
          3⤵
          • Launches sc.exe
          PID:2824
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2904
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2180
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1556
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1524
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"
        2⤵
          PID:2864
        • C:\Windows\System32\schtasks.exe
          C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\daxnezzxggok.xml"
          2⤵
          • Creates scheduled task(s)
          PID:1668
        • C:\Windows\System32\schtasks.exe
          C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
          2⤵
            PID:2428
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
            2⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:600
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1092
            • C:\Windows\System32\sc.exe
              sc stop UsoSvc
              3⤵
              • Launches sc.exe
              PID:1504
            • C:\Windows\System32\sc.exe
              sc stop WaaSMedicSvc
              3⤵
              • Launches sc.exe
              PID:576
            • C:\Windows\System32\sc.exe
              sc stop wuauserv
              3⤵
              • Launches sc.exe
              PID:2024
            • C:\Windows\System32\sc.exe
              sc stop bits
              3⤵
              • Launches sc.exe
              PID:1852
            • C:\Windows\System32\sc.exe
              sc stop dosvc
              3⤵
              • Launches sc.exe
              PID:1084
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1056
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-ac 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2624
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2252
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-ac 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:308
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2196
          • C:\Windows\System32\schtasks.exe
            C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\daxnezzxggok.xml"
            2⤵
            • Creates scheduled task(s)
            PID:1416
          • C:\Windows\System32\conhost.exe
            C:\Windows\System32\conhost.exe
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Suspicious behavior: EnumeratesProcesses
            PID:2940
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
            2⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2284
          • C:\Windows\System32\schtasks.exe
            C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\unpdvskmgvui.xml"
            2⤵
            • Creates scheduled task(s)
            PID:872
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1940
        • C:\Program Files\Google\Chrome\updater.exe
          "C:\Program Files\Google\Chrome\updater.exe"
          1⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1888

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files\Google\Chrome\updater.exe

                Filesize

                9.5MB

                MD5

                c08838a78e5116db745813e83e290c40

                SHA1

                10249da56d9b70b4cc4f3121ff1f26afbe8eec77

                SHA256

                8cdb96d3f7eeda15bced1a55c47b5e0f099d62d1a26cfb5391d8fa5bbb10931e

                SHA512

                8ee8357f09735f3ba23b530755e90db78522f2ba1fee9bfc39bb45f14d43e0f95d6fa861646bf2fd36cd261009b121c9ee7ba8b4d59fde810acd3ab992bbc708

              • C:\Program Files\Google\Chrome\updater.exe

                Filesize

                9.5MB

                MD5

                c08838a78e5116db745813e83e290c40

                SHA1

                10249da56d9b70b4cc4f3121ff1f26afbe8eec77

                SHA256

                8cdb96d3f7eeda15bced1a55c47b5e0f099d62d1a26cfb5391d8fa5bbb10931e

                SHA512

                8ee8357f09735f3ba23b530755e90db78522f2ba1fee9bfc39bb45f14d43e0f95d6fa861646bf2fd36cd261009b121c9ee7ba8b4d59fde810acd3ab992bbc708

              • C:\Users\Admin\AppData\Local\Temp\daxnezzxggok.xml

                Filesize

                1KB

                MD5

                546d67a48ff2bf7682cea9fac07b942e

                SHA1

                a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90

                SHA256

                eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a

                SHA512

                10d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe

              • C:\Windows\System32\drivers\etc\hosts

                Filesize

                2KB

                MD5

                3e9af076957c5b2f9c9ce5ec994bea05

                SHA1

                a8c7326f6bceffaeed1c2bb8d7165e56497965fe

                SHA256

                e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e

                SHA512

                933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f

              • C:\Windows\TEMP\daxnezzxggok.xml

                Filesize

                1KB

                MD5

                546d67a48ff2bf7682cea9fac07b942e

                SHA1

                a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90

                SHA256

                eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a

                SHA512

                10d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe

              • C:\Windows\TEMP\unpdvskmgvui.xml

                Filesize

                1KB

                MD5

                546d67a48ff2bf7682cea9fac07b942e

                SHA1

                a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90

                SHA256

                eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a

                SHA512

                10d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe

              • \Program Files\Google\Chrome\updater.exe

                Filesize

                9.5MB

                MD5

                c08838a78e5116db745813e83e290c40

                SHA1

                10249da56d9b70b4cc4f3121ff1f26afbe8eec77

                SHA256

                8cdb96d3f7eeda15bced1a55c47b5e0f099d62d1a26cfb5391d8fa5bbb10931e

                SHA512

                8ee8357f09735f3ba23b530755e90db78522f2ba1fee9bfc39bb45f14d43e0f95d6fa861646bf2fd36cd261009b121c9ee7ba8b4d59fde810acd3ab992bbc708

              • memory/600-28-0x00000000012D0000-0x0000000001350000-memory.dmp

                Filesize

                512KB

              • memory/600-27-0x00000000012D0000-0x0000000001350000-memory.dmp

                Filesize

                512KB

              • memory/600-26-0x00000000012D0000-0x0000000001350000-memory.dmp

                Filesize

                512KB

              • memory/600-22-0x0000000019D30000-0x000000001A012000-memory.dmp

                Filesize

                2.9MB

              • memory/600-29-0x000007FEF5410000-0x000007FEF5DAD000-memory.dmp

                Filesize

                9.6MB

              • memory/600-25-0x000007FEF5410000-0x000007FEF5DAD000-memory.dmp

                Filesize

                9.6MB

              • memory/600-23-0x000007FEF5410000-0x000007FEF5DAD000-memory.dmp

                Filesize

                9.6MB

              • memory/600-24-0x0000000000990000-0x0000000000998000-memory.dmp

                Filesize

                32KB

              • memory/1888-40-0x000000013FD80000-0x000000014071C000-memory.dmp

                Filesize

                9.6MB

              • memory/1888-32-0x000000013FD80000-0x000000014071C000-memory.dmp

                Filesize

                9.6MB

              • memory/1888-36-0x000000013FD80000-0x000000014071C000-memory.dmp

                Filesize

                9.6MB

              • memory/1888-35-0x000000013FD80000-0x000000014071C000-memory.dmp

                Filesize

                9.6MB

              • memory/1888-52-0x000000013FD80000-0x000000014071C000-memory.dmp

                Filesize

                9.6MB

              • memory/1888-21-0x000000013FD80000-0x000000014071C000-memory.dmp

                Filesize

                9.6MB

              • memory/1940-53-0x00000000001B0000-0x00000000001D0000-memory.dmp

                Filesize

                128KB

              • memory/2284-41-0x000007FEF5DB0000-0x000007FEF674D000-memory.dmp

                Filesize

                9.6MB

              • memory/2284-46-0x000007FEF5DB0000-0x000007FEF674D000-memory.dmp

                Filesize

                9.6MB

              • memory/2284-45-0x0000000001200000-0x0000000001280000-memory.dmp

                Filesize

                512KB

              • memory/2284-42-0x0000000001200000-0x0000000001280000-memory.dmp

                Filesize

                512KB

              • memory/2284-43-0x000007FEF5DB0000-0x000007FEF674D000-memory.dmp

                Filesize

                9.6MB

              • memory/2284-44-0x0000000001200000-0x0000000001280000-memory.dmp

                Filesize

                512KB

              • memory/2724-0-0x000000013F4E0000-0x000000013FE7C000-memory.dmp

                Filesize

                9.6MB

              • memory/2724-10-0x000000013F4E0000-0x000000013FE7C000-memory.dmp

                Filesize

                9.6MB

              • memory/2724-14-0x000000013F4E0000-0x000000013FE7C000-memory.dmp

                Filesize

                9.6MB

              • memory/2724-18-0x000000013F4E0000-0x000000013FE7C000-memory.dmp

                Filesize

                9.6MB

              • memory/2776-9-0x00000000023CB000-0x0000000002432000-memory.dmp

                Filesize

                412KB

              • memory/2776-5-0x000000001B2D0000-0x000000001B5B2000-memory.dmp

                Filesize

                2.9MB

              • memory/2776-6-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

                Filesize

                32KB

              • memory/2776-7-0x000007FEF5DB0000-0x000007FEF674D000-memory.dmp

                Filesize

                9.6MB

              • memory/2776-8-0x00000000023C4000-0x00000000023C7000-memory.dmp

                Filesize

                12KB

              • memory/2940-50-0x0000000140000000-0x0000000140013000-memory.dmp

                Filesize

                76KB