Resubmissions

30/12/2023, 13:31

231230-qsrkaahffl 10

30/12/2023, 12:06

231230-n98h1sdhfj 10

30/12/2023, 12:06

231230-n9779adhep 10

30/12/2023, 12:06

231230-n97xgsgaf7 10

30/12/2023, 12:06

231230-n97aysgaf6 10

30/12/2023, 12:06

231230-n96z7adhej 10

30/12/2023, 12:06

231230-n96pesdhdq 10

29/12/2023, 23:47

231229-3sy1ksader 10

29/12/2023, 23:47

231229-3syd2saden 10

29/12/2023, 23:47

231229-3sxgrachf3 10

Analysis

  • max time kernel
    1795s
  • max time network
    1789s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 12:06

General

  • Target

    main.exe

  • Size

    6.9MB

  • MD5

    22c978ffaefef3389bf29068b9621661

  • SHA1

    5671972c1d70826fb85dced4c83c700dd282ea21

  • SHA256

    e6ee8e9b38e10a92a89e61b8655ca4fedcc381fd93cb36f43fe323132923dfcf

  • SHA512

    8a280cb782f0afab171d2e7955b75362e98cefd449d382004ef2568c2c230cd633a754b1dd5f0dc5e17407819e4dceb5b0cbb2647e279a6ec674b8d9484be26a

  • SSDEEP

    98304:7b5Ak7khMiyw0VREqfnle5EEPbxVhCQHSIMf:5LUMiywZqshDxaQHh

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 33 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\main.exe
    "C:\Users\Admin\AppData\Local\Temp\main.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe
      xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3228
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k UnistackSvcGroup
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4840
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:3388

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3228-34-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-33-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-52-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-51-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-50-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-49-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-48-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-47-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-46-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-45-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-44-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-43-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-42-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-41-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-40-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-39-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-38-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-37-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-36-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-35-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-14-0x00000194C73B0000-0x00000194C73D0000-memory.dmp

      Filesize

      128KB

    • memory/3228-32-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-15-0x00000194C73F0000-0x00000194C7410000-memory.dmp

      Filesize

      128KB

    • memory/3228-31-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-30-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-29-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-28-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-27-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-26-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-25-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-24-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-23-0x00000194C7430000-0x00000194C7450000-memory.dmp

      Filesize

      128KB

    • memory/3228-22-0x00000194C7410000-0x00000194C7430000-memory.dmp

      Filesize

      128KB

    • memory/3228-21-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-20-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-19-0x00000194C7430000-0x00000194C7450000-memory.dmp

      Filesize

      128KB

    • memory/3228-18-0x00000194C7410000-0x00000194C7430000-memory.dmp

      Filesize

      128KB

    • memory/3228-17-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/3228-16-0x00007FF685F00000-0x00007FF686A03000-memory.dmp

      Filesize

      11.0MB

    • memory/4840-69-0x0000023E21E40000-0x0000023E21E50000-memory.dmp

      Filesize

      64KB

    • memory/4840-53-0x0000023E21D40000-0x0000023E21D50000-memory.dmp

      Filesize

      64KB