Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
17/11/2023, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
06E7057329969BD1E784998844C0EDCF2217F687.exe
Resource
win7-20231025-en
General
-
Target
06E7057329969BD1E784998844C0EDCF2217F687.exe
-
Size
6.7MB
-
MD5
c24a1dabb1317bf50bac152886909815
-
SHA1
06e7057329969bd1e784998844c0edcf2217f687
-
SHA256
094e85e0a3de0e0c907c942f6cb4d97ee434d2a7db81a4a19da65a4cd010c3f5
-
SHA512
923e0429b9c21b12eb815d5659e9875c87d083e16da058b025d722b9caf6d9d2865f6ac5e78653d68d19f00a9ec372f08cf5c173d927ad5d94ce5ec718abbd47
-
SSDEEP
196608:HrZ9ae2vQfoyoA3uXBPrfj0kHRkNCtItIuqaNNL/bQ:NIvGoyoKeWkaNCtQjk
Malware Config
Signatures
-
XMRig Miner payload 19 IoCs
resource yara_rule behavioral1/memory/2712-15-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-17-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-18-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-19-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-25-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-26-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-32-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-34-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-37-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-39-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-41-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-43-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-45-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-47-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-49-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-51-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-53-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-55-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig behavioral1/memory/2712-57-0x000000013F8D0000-0x0000000141002000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 2712 dIlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 2296 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 31 IoCs
pid Process 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 2712 dIlhost.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2104 tasklist.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2104 tasklist.exe Token: SeLockMemoryPrivilege 2712 dIlhost.exe Token: SeLockMemoryPrivilege 2712 dIlhost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 dIlhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2296 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 28 PID 2332 wrote to memory of 2296 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 28 PID 2332 wrote to memory of 2296 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 28 PID 2332 wrote to memory of 2296 2332 06E7057329969BD1E784998844C0EDCF2217F687.exe 28 PID 2296 wrote to memory of 2104 2296 cmd.exe 30 PID 2296 wrote to memory of 2104 2296 cmd.exe 30 PID 2296 wrote to memory of 2104 2296 cmd.exe 30 PID 2296 wrote to memory of 2104 2296 cmd.exe 30 PID 2296 wrote to memory of 1380 2296 cmd.exe 31 PID 2296 wrote to memory of 1380 2296 cmd.exe 31 PID 2296 wrote to memory of 1380 2296 cmd.exe 31 PID 2296 wrote to memory of 1380 2296 cmd.exe 31 PID 2296 wrote to memory of 2712 2296 cmd.exe 33 PID 2296 wrote to memory of 2712 2296 cmd.exe 33 PID 2296 wrote to memory of 2712 2296 cmd.exe 33 PID 2296 wrote to memory of 2712 2296 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\06E7057329969BD1E784998844C0EDCF2217F687.exe"C:\Users\Admin\AppData\Local\Temp\06E7057329969BD1E784998844C0EDCF2217F687.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2332G8PO.bat" "C:\Users\Admin\AppData\Local\Temp\06E7057329969BD1E784998844C0EDCF2217F687.exe""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\tasklist.exeTASKLIST3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I "dIlhost.exe"3⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309B
MD5311e664bb501e120a858805daa618c62
SHA1d8832a015244d6eea3f5ac472ef345fa61b37dba
SHA25696a437bb8fabbc646cef7cc8964408e5b365712ee9e763dccbbd9eb2e42faefc
SHA512a09c74d6f1531ec7a42fb8b03726cfc2590121aedd2a86dcca2759cd739e676f7b706bd1f16c20e52b11c7d614198b97b92d4f5e3a78dda939e3b029d51346f9
-
Filesize
5.2MB
MD5862b082cf81962e8a899cffca36ab37d
SHA1f096529eadbe269b13399ababa6136a05cb22ce2
SHA256249d69c7991524b6f9525665dc6b4194557192e97963ae698fac2da78da7e350
SHA5127a0927c1307503ca4b80127d72ed2a84d499533c3a27f59b8ec897ca3511684f2d08dff284d7af094797af1c40ed2607e1cc6d9d062826c16f65051bb76f9fa0
-
Filesize
5.2MB
MD5862b082cf81962e8a899cffca36ab37d
SHA1f096529eadbe269b13399ababa6136a05cb22ce2
SHA256249d69c7991524b6f9525665dc6b4194557192e97963ae698fac2da78da7e350
SHA5127a0927c1307503ca4b80127d72ed2a84d499533c3a27f59b8ec897ca3511684f2d08dff284d7af094797af1c40ed2607e1cc6d9d062826c16f65051bb76f9fa0
-
Filesize
5.2MB
MD5862b082cf81962e8a899cffca36ab37d
SHA1f096529eadbe269b13399ababa6136a05cb22ce2
SHA256249d69c7991524b6f9525665dc6b4194557192e97963ae698fac2da78da7e350
SHA5127a0927c1307503ca4b80127d72ed2a84d499533c3a27f59b8ec897ca3511684f2d08dff284d7af094797af1c40ed2607e1cc6d9d062826c16f65051bb76f9fa0