Analysis
-
max time kernel
81s -
max time network
295s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 22:23
Static task
static1
Behavioral task
behavioral1
Sample
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe
Resource
win10-20231215-en
General
-
Target
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe
-
Size
6.4MB
-
MD5
2eafb4926d78feb0b61d5b995d0fe6ee
-
SHA1
f6e75678f1dafcb18408452ea948b9ad51b5d83e
-
SHA256
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30
-
SHA512
1885f5874c44a6841be4d53140ad63304e8d1924bb98fe14602d884fbc289ec8913db772a9e2db93e45298d1328700e2000ddab109af3964eaf6f23af61ef78e
-
SSDEEP
196608:1pznZ/ySos+NnrlQ5jrNoIgDJ0I6x/oAP:1pDZk9LQ5vNdeJ0IC
Malware Config
Signatures
-
XMRig Miner payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/2480-18-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-19-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-22-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-23-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-29-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-31-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-33-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-32-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-30-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-27-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-24-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-21-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-20-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-17-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-35-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2480-34-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
iojmibhyhiws.exe50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iojmibhyhiws.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2564 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
iojmibhyhiws.exepid process 480 2820 iojmibhyhiws.exe -
Loads dropped DLL 1 IoCs
Processes:
pid process 480 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
iojmibhyhiws.exedescription pid process target process PID 2820 set thread context of 2056 2820 iojmibhyhiws.exe conhost.exe PID 2820 set thread context of 2480 2820 iojmibhyhiws.exe conhost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 3048 sc.exe 2604 sc.exe 2568 sc.exe 2744 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exeiojmibhyhiws.execonhost.exepid process 1740 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 1740 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 1740 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 1740 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 1740 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 2820 iojmibhyhiws.exe 2820 iojmibhyhiws.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe 2480 conhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
conhost.exedescription pid process Token: SeLockMemoryPrivilege 2480 conhost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
cmd.exeiojmibhyhiws.exedescription pid process target process PID 2564 wrote to memory of 2612 2564 cmd.exe choice.exe PID 2564 wrote to memory of 2612 2564 cmd.exe choice.exe PID 2564 wrote to memory of 2612 2564 cmd.exe choice.exe PID 2820 wrote to memory of 2056 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2056 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2056 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2056 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2056 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2056 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2056 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2056 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2056 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe PID 2820 wrote to memory of 2480 2820 iojmibhyhiws.exe conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe"C:\Users\Admin\AppData\Local\Temp\50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FLWCUERA"2⤵
- Launches sc.exe
PID:3048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2564
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "FLWCUERA"2⤵
- Launches sc.exe
PID:2604
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2568
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"2⤵
- Launches sc.exe
PID:2744
-
-
C:\Windows\system32\conhost.execonhost.exe1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe1⤵PID:2056
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeC:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD56ce7a1ee93a7109452657215be98b130
SHA142dd1e150fa1ca3932d7e1a8f2b3f651fc1d42d0
SHA256aa242b991535f631e0612bb6b53baf2cec51e023d2c7d5fc38a479ef81a38d54
SHA5129d9c3dadde8ec279002f7f3be6dc572c546abfa0bd4b342821e25f6bbeb375450d642a77f108fcead47efe0ef4af6ce9d583f728834de7e301e5eb76ce114aa1
-
Filesize
893KB
MD538f989de2af5f871b11c8e30e58cfb6f
SHA1bea8f4ad5171c988487b6d5d33c2d2aa6ceb40b5
SHA25695d10419ada00d3c9d308ca2408942eb60d4c2cabfc9dbbb66e16444774fea38
SHA512ed8cfff2dac94e14e63f64152664182d41c06f3eb20e6a4760d87d7e723f5d088cb3045fd6b7fa2155db93dca869d2daa9b2ff52d2d715c8c3898b9e444220af
-
Filesize
384KB
MD56100cf1c34acb287caa6a7cdc7ec51a5
SHA10207792e053162a0dda39bb784f8df76f92c7943
SHA256dcb4c821180e7de31a5fef0abc84b85c629e362c5d1951782c5801406e7acad7
SHA512990551e46e4201e51c12e03287dd8600a74f088943eed063622f9191a27808e9d091362991739df6e4f1eb82d22f8783ed9caf0b8792e487655ad7dd0d9fd334