Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    17/11/2023, 12:53

General

  • Target

    06E7057329969BD1E784998844C0EDCF2217F687.exe

  • Size

    6.7MB

  • MD5

    c24a1dabb1317bf50bac152886909815

  • SHA1

    06e7057329969bd1e784998844c0edcf2217f687

  • SHA256

    094e85e0a3de0e0c907c942f6cb4d97ee434d2a7db81a4a19da65a4cd010c3f5

  • SHA512

    923e0429b9c21b12eb815d5659e9875c87d083e16da058b025d722b9caf6d9d2865f6ac5e78653d68d19f00a9ec372f08cf5c173d927ad5d94ce5ec718abbd47

  • SSDEEP

    196608:HrZ9ae2vQfoyoA3uXBPrfj0kHRkNCtItIuqaNNL/bQ:NIvGoyoKeWkaNCtQjk

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 19 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 31 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06E7057329969BD1E784998844C0EDCF2217F687.exe
    "C:\Users\Admin\AppData\Local\Temp\06E7057329969BD1E784998844C0EDCF2217F687.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2332G8PO.bat" "C:\Users\Admin\AppData\Local\Temp\06E7057329969BD1E784998844C0EDCF2217F687.exe""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Windows\SysWOW64\tasklist.exe
        TASKLIST
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2104
      • C:\Windows\SysWOW64\findstr.exe
        FINDSTR /I "dIlhost.exe"
        3⤵
          PID:1380
        • C:\Users\Admin\AppData\Local\Temp\dIlhost.exe
          "C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2712

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2332G8PO.bat

      Filesize

      309B

      MD5

      311e664bb501e120a858805daa618c62

      SHA1

      d8832a015244d6eea3f5ac472ef345fa61b37dba

      SHA256

      96a437bb8fabbc646cef7cc8964408e5b365712ee9e763dccbbd9eb2e42faefc

      SHA512

      a09c74d6f1531ec7a42fb8b03726cfc2590121aedd2a86dcca2759cd739e676f7b706bd1f16c20e52b11c7d614198b97b92d4f5e3a78dda939e3b029d51346f9

    • C:\Users\Admin\AppData\Local\Temp\dIlhost.exe

      Filesize

      5.2MB

      MD5

      862b082cf81962e8a899cffca36ab37d

      SHA1

      f096529eadbe269b13399ababa6136a05cb22ce2

      SHA256

      249d69c7991524b6f9525665dc6b4194557192e97963ae698fac2da78da7e350

      SHA512

      7a0927c1307503ca4b80127d72ed2a84d499533c3a27f59b8ec897ca3511684f2d08dff284d7af094797af1c40ed2607e1cc6d9d062826c16f65051bb76f9fa0

    • \??\c:\users\admin\appdata\local\temp\dilhost.exe

      Filesize

      5.2MB

      MD5

      862b082cf81962e8a899cffca36ab37d

      SHA1

      f096529eadbe269b13399ababa6136a05cb22ce2

      SHA256

      249d69c7991524b6f9525665dc6b4194557192e97963ae698fac2da78da7e350

      SHA512

      7a0927c1307503ca4b80127d72ed2a84d499533c3a27f59b8ec897ca3511684f2d08dff284d7af094797af1c40ed2607e1cc6d9d062826c16f65051bb76f9fa0

    • \Users\Admin\AppData\Local\Temp\dIlhost.exe

      Filesize

      5.2MB

      MD5

      862b082cf81962e8a899cffca36ab37d

      SHA1

      f096529eadbe269b13399ababa6136a05cb22ce2

      SHA256

      249d69c7991524b6f9525665dc6b4194557192e97963ae698fac2da78da7e350

      SHA512

      7a0927c1307503ca4b80127d72ed2a84d499533c3a27f59b8ec897ca3511684f2d08dff284d7af094797af1c40ed2607e1cc6d9d062826c16f65051bb76f9fa0

    • memory/2296-28-0x0000000001F70000-0x00000000036A2000-memory.dmp

      Filesize

      23.2MB

    • memory/2296-9-0x0000000001F70000-0x00000000036A2000-memory.dmp

      Filesize

      23.2MB

    • memory/2332-50-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-0-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-54-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-52-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-2-0x0000000077890000-0x0000000077891000-memory.dmp

      Filesize

      4KB

    • memory/2332-48-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-46-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-56-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-44-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-42-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-40-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-38-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-35-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-33-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-24-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2332-31-0x0000000000400000-0x0000000000799000-memory.dmp

      Filesize

      3.6MB

    • memory/2712-17-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-41-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-26-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-29-0x000007FFFFBD0000-0x000007FFFFFA1000-memory.dmp

      Filesize

      3.8MB

    • memory/2712-30-0x0000000077690000-0x0000000077839000-memory.dmp

      Filesize

      1.7MB

    • memory/2712-25-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-32-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-23-0x0000000077840000-0x0000000077850000-memory.dmp

      Filesize

      64KB

    • memory/2712-34-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-22-0x0000000001DB0000-0x0000000001DC0000-memory.dmp

      Filesize

      64KB

    • memory/2712-36-0x0000000002000000-0x0000000002020000-memory.dmp

      Filesize

      128KB

    • memory/2712-37-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-20-0x0000000000140000-0x0000000000160000-memory.dmp

      Filesize

      128KB

    • memory/2712-39-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-21-0x0000000077690000-0x0000000077839000-memory.dmp

      Filesize

      1.7MB

    • memory/2712-27-0x0000000002000000-0x0000000002020000-memory.dmp

      Filesize

      128KB

    • memory/2712-19-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-43-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-18-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-45-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-15-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-47-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-16-0x0000000001DA0000-0x0000000001DB0000-memory.dmp

      Filesize

      64KB

    • memory/2712-49-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-14-0x0000000077690000-0x0000000077839000-memory.dmp

      Filesize

      1.7MB

    • memory/2712-51-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-13-0x0000000077690000-0x0000000077839000-memory.dmp

      Filesize

      1.7MB

    • memory/2712-53-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-12-0x000007FFFFBD0000-0x000007FFFFFA1000-memory.dmp

      Filesize

      3.8MB

    • memory/2712-55-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-11-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB

    • memory/2712-57-0x000000013F8D0000-0x0000000141002000-memory.dmp

      Filesize

      23.2MB