Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
06E7057329969BD1E784998844C0EDCF2217F687.exe
Resource
win7-20231025-en
General
-
Target
06E7057329969BD1E784998844C0EDCF2217F687.exe
-
Size
6.7MB
-
MD5
c24a1dabb1317bf50bac152886909815
-
SHA1
06e7057329969bd1e784998844c0edcf2217f687
-
SHA256
094e85e0a3de0e0c907c942f6cb4d97ee434d2a7db81a4a19da65a4cd010c3f5
-
SHA512
923e0429b9c21b12eb815d5659e9875c87d083e16da058b025d722b9caf6d9d2865f6ac5e78653d68d19f00a9ec372f08cf5c173d927ad5d94ce5ec718abbd47
-
SSDEEP
196608:HrZ9ae2vQfoyoA3uXBPrfj0kHRkNCtItIuqaNNL/bQ:NIvGoyoKeWkaNCtQjk
Malware Config
Signatures
-
XMRig Miner payload 19 IoCs
resource yara_rule behavioral2/memory/4876-15-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-17-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-18-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-20-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-27-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-29-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-31-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-35-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-38-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-40-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-42-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-45-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-47-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-49-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-51-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-53-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-55-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-57-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig behavioral2/memory/4876-59-0x00007FF7F02C0000-0x00007FF7F19F2000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 4876 dIlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 31 IoCs
pid Process 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 4876 dIlhost.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1912 tasklist.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1912 tasklist.exe Token: SeLockMemoryPrivilege 4876 dIlhost.exe Token: SeLockMemoryPrivilege 4876 dIlhost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4876 dIlhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2844 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 87 PID 1140 wrote to memory of 2844 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 87 PID 1140 wrote to memory of 2844 1140 06E7057329969BD1E784998844C0EDCF2217F687.exe 87 PID 2844 wrote to memory of 1912 2844 cmd.exe 89 PID 2844 wrote to memory of 1912 2844 cmd.exe 89 PID 2844 wrote to memory of 1912 2844 cmd.exe 89 PID 2844 wrote to memory of 2108 2844 cmd.exe 90 PID 2844 wrote to memory of 2108 2844 cmd.exe 90 PID 2844 wrote to memory of 2108 2844 cmd.exe 90 PID 2844 wrote to memory of 4876 2844 cmd.exe 93 PID 2844 wrote to memory of 4876 2844 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\06E7057329969BD1E784998844C0EDCF2217F687.exe"C:\Users\Admin\AppData\Local\Temp\06E7057329969BD1E784998844C0EDCF2217F687.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1140UR0Q.bat" "C:\Users\Admin\AppData\Local\Temp\06E7057329969BD1E784998844C0EDCF2217F687.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\tasklist.exeTASKLIST3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I "dIlhost.exe"3⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309B
MD5311e664bb501e120a858805daa618c62
SHA1d8832a015244d6eea3f5ac472ef345fa61b37dba
SHA25696a437bb8fabbc646cef7cc8964408e5b365712ee9e763dccbbd9eb2e42faefc
SHA512a09c74d6f1531ec7a42fb8b03726cfc2590121aedd2a86dcca2759cd739e676f7b706bd1f16c20e52b11c7d614198b97b92d4f5e3a78dda939e3b029d51346f9
-
Filesize
5.2MB
MD5862b082cf81962e8a899cffca36ab37d
SHA1f096529eadbe269b13399ababa6136a05cb22ce2
SHA256249d69c7991524b6f9525665dc6b4194557192e97963ae698fac2da78da7e350
SHA5127a0927c1307503ca4b80127d72ed2a84d499533c3a27f59b8ec897ca3511684f2d08dff284d7af094797af1c40ed2607e1cc6d9d062826c16f65051bb76f9fa0
-
Filesize
5.2MB
MD5862b082cf81962e8a899cffca36ab37d
SHA1f096529eadbe269b13399ababa6136a05cb22ce2
SHA256249d69c7991524b6f9525665dc6b4194557192e97963ae698fac2da78da7e350
SHA5127a0927c1307503ca4b80127d72ed2a84d499533c3a27f59b8ec897ca3511684f2d08dff284d7af094797af1c40ed2607e1cc6d9d062826c16f65051bb76f9fa0