Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2023 18:23
Static task
static1
Behavioral task
behavioral1
Sample
chrome.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
chrome.exe
Resource
win10v2004-20231023-en
General
-
Target
chrome.exe
-
Size
2.5MB
-
MD5
ebb6b4df8ef14535341ce9e81e44ea0a
-
SHA1
c479d825df37634d45c1018e3523b67fec7b02e6
-
SHA256
35650d544b8202673e3a76d0f1f515da0f8e27d916e310ecb1161cf7dfd66480
-
SHA512
a21033c271854b5e4c8422470eade1d5115ac7a4112e2afd79509ac682695cdf8c3d7528fcdc549b1ce62735a26691f4103f33eaf271f1843d4132c664113b9a
-
SSDEEP
49152:cq11VuxejMjcteDCf11GQEET9cVIWE9zZJML:FzEejKcteDc13VJYHE9zZJML
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral2/memory/3608-16-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3608-17-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3608-19-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3608-20-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3608-21-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3608-22-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3608-23-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3608-24-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2556 avlpdusqcmzw.exe -
resource yara_rule behavioral2/memory/3608-11-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-12-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-13-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-14-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-15-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-19-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-20-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-21-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-22-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-23-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3608-24-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2556 set thread context of 3948 2556 avlpdusqcmzw.exe 125 PID 2556 set thread context of 3608 2556 avlpdusqcmzw.exe 123 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3660 sc.exe 2528 sc.exe 2448 sc.exe 1016 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 2556 avlpdusqcmzw.exe 2556 avlpdusqcmzw.exe 2556 avlpdusqcmzw.exe 2556 avlpdusqcmzw.exe 2556 avlpdusqcmzw.exe 2556 avlpdusqcmzw.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 4548 powercfg.exe Token: SeCreatePagefilePrivilege 4548 powercfg.exe Token: SeShutdownPrivilege 4396 powercfg.exe Token: SeCreatePagefilePrivilege 4396 powercfg.exe Token: SeShutdownPrivilege 4448 powercfg.exe Token: SeCreatePagefilePrivilege 4448 powercfg.exe Token: SeShutdownPrivilege 3652 powercfg.exe Token: SeCreatePagefilePrivilege 3652 powercfg.exe Token: SeShutdownPrivilege 4368 powercfg.exe Token: SeCreatePagefilePrivilege 4368 powercfg.exe Token: SeShutdownPrivilege 4424 powercfg.exe Token: SeCreatePagefilePrivilege 4424 powercfg.exe Token: SeShutdownPrivilege 4360 powercfg.exe Token: SeCreatePagefilePrivilege 4360 powercfg.exe Token: SeShutdownPrivilege 4916 powercfg.exe Token: SeCreatePagefilePrivilege 4916 powercfg.exe Token: SeLockMemoryPrivilege 3608 explorer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3780 wrote to memory of 2432 3780 cmd.exe 118 PID 3780 wrote to memory of 2432 3780 cmd.exe 118 PID 2556 wrote to memory of 3948 2556 avlpdusqcmzw.exe 125 PID 2556 wrote to memory of 3948 2556 avlpdusqcmzw.exe 125 PID 2556 wrote to memory of 3948 2556 avlpdusqcmzw.exe 125 PID 2556 wrote to memory of 3948 2556 avlpdusqcmzw.exe 125 PID 2556 wrote to memory of 3948 2556 avlpdusqcmzw.exe 125 PID 2556 wrote to memory of 3948 2556 avlpdusqcmzw.exe 125 PID 2556 wrote to memory of 3948 2556 avlpdusqcmzw.exe 125 PID 2556 wrote to memory of 3948 2556 avlpdusqcmzw.exe 125 PID 2556 wrote to memory of 3948 2556 avlpdusqcmzw.exe 125 PID 2556 wrote to memory of 3608 2556 avlpdusqcmzw.exe 123 PID 2556 wrote to memory of 3608 2556 avlpdusqcmzw.exe 123 PID 2556 wrote to memory of 3608 2556 avlpdusqcmzw.exe 123 PID 2556 wrote to memory of 3608 2556 avlpdusqcmzw.exe 123 PID 2556 wrote to memory of 3608 2556 avlpdusqcmzw.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DRJOPRRJ"2⤵
- Launches sc.exe
PID:3660
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DRJOPRRJ" binpath= "C:\ProgramData\yrlmpfsjbrnv\avlpdusqcmzw.exe" start= "auto"2⤵
- Launches sc.exe
PID:2528
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\chrome.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:2432
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DRJOPRRJ"2⤵
- Launches sc.exe
PID:1016
-
-
C:\ProgramData\yrlmpfsjbrnv\avlpdusqcmzw.exeC:\ProgramData\yrlmpfsjbrnv\avlpdusqcmzw.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3948
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5ebb6b4df8ef14535341ce9e81e44ea0a
SHA1c479d825df37634d45c1018e3523b67fec7b02e6
SHA25635650d544b8202673e3a76d0f1f515da0f8e27d916e310ecb1161cf7dfd66480
SHA512a21033c271854b5e4c8422470eade1d5115ac7a4112e2afd79509ac682695cdf8c3d7528fcdc549b1ce62735a26691f4103f33eaf271f1843d4132c664113b9a
-
Filesize
2.5MB
MD5ebb6b4df8ef14535341ce9e81e44ea0a
SHA1c479d825df37634d45c1018e3523b67fec7b02e6
SHA25635650d544b8202673e3a76d0f1f515da0f8e27d916e310ecb1161cf7dfd66480
SHA512a21033c271854b5e4c8422470eade1d5115ac7a4112e2afd79509ac682695cdf8c3d7528fcdc549b1ce62735a26691f4103f33eaf271f1843d4132c664113b9a