Analysis
-
max time kernel
184s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe
Resource
win10-20231215-en
General
-
Target
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe
-
Size
6.4MB
-
MD5
2eafb4926d78feb0b61d5b995d0fe6ee
-
SHA1
f6e75678f1dafcb18408452ea948b9ad51b5d83e
-
SHA256
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30
-
SHA512
1885f5874c44a6841be4d53140ad63304e8d1924bb98fe14602d884fbc289ec8913db772a9e2db93e45298d1328700e2000ddab109af3964eaf6f23af61ef78e
-
SSDEEP
196608:1pznZ/ySos+NnrlQ5jrNoIgDJ0I6x/oAP:1pDZk9LQ5vNdeJ0IC
Malware Config
Signatures
-
XMRig Miner payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1984-17-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-18-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-19-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-20-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-21-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-22-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-23-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-24-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-26-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-29-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-30-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-31-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-32-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-33-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-34-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-35-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-38-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-39-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-40-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1984-41-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exeiojmibhyhiws.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iojmibhyhiws.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 3060 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
iojmibhyhiws.exepid process 468 2084 iojmibhyhiws.exe -
Loads dropped DLL 1 IoCs
Processes:
pid process 468 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
iojmibhyhiws.exedescription pid process target process PID 2084 set thread context of 2240 2084 iojmibhyhiws.exe conhost.exe PID 2084 set thread context of 1984 2084 iojmibhyhiws.exe conhost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2948 sc.exe 2716 sc.exe 2324 sc.exe 2724 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exeiojmibhyhiws.execonhost.exepid process 1096 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 1096 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 1096 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 1096 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 1096 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 2084 iojmibhyhiws.exe 2084 iojmibhyhiws.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe 1984 conhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 468 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
conhost.exedescription pid process Token: SeLockMemoryPrivilege 1984 conhost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
cmd.exeiojmibhyhiws.exedescription pid process target process PID 3060 wrote to memory of 2856 3060 cmd.exe choice.exe PID 3060 wrote to memory of 2856 3060 cmd.exe choice.exe PID 3060 wrote to memory of 2856 3060 cmd.exe choice.exe PID 2084 wrote to memory of 2240 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 2240 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 2240 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 2240 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 2240 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 2240 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 2240 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 2240 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 2240 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe PID 2084 wrote to memory of 1984 2084 iojmibhyhiws.exe conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe"C:\Users\Admin\AppData\Local\Temp\50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"2⤵
- Launches sc.exe
PID:2948
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FLWCUERA"2⤵
- Launches sc.exe
PID:2716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3060
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "FLWCUERA"2⤵
- Launches sc.exe
PID:2324
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2724
-
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:2856
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe1⤵PID:2240
-
C:\Windows\system32\conhost.execonhost.exe1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeC:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5af8731dbd6a485a9f59afb65c84e2366
SHA1476998a063e24db7fd98dbb67c55d16a76d6a16a
SHA25665a5b4e30e8beb761315597fc1c3b6d7d8685bafb2a2ac6033ca7615dc7d3c39
SHA512fa1c10d79319726fa6825a08a6b169edd6df021809455b4d8cd80e0ff97e7e78a3730a3cfce4d94752769eba3e94a09b11d8714f776d45b60395a4344f8a5482
-
Filesize
565KB
MD503a547f632dddc8d0590b172f6110791
SHA1f9ca6b0293355e229404dfbc2b5b907df9344b41
SHA256f905538c59d146f205ec237261c1d22b3d9402b2134a81435f654dedd83c64a8
SHA5124adcdff92b7d231824744f29fc3035631572d521035f6aae8f3bce8cc1560d5379f0a1cdb5c0c262aa4d0d448394ac1c3ccd99362c4794c04218920f57cb3407
-
Filesize
761KB
MD50f99021c328f60aec0519a75221ba113
SHA155060f4a45731d08778144f34e3fc10fcfa04e9b
SHA256e708c0d4d13d388accf1145859abd2ac3199b47bcdebefbee57d2c1734c582f0
SHA51260d1d5a692dad5a7b4873799a4015d377986a3625e77da2ee4f2e8b072115434f64d3447a83f601baf3101880c3dc5a6577bdd870d02fe134e74930583b683c5
-
Filesize
704KB
MD57fda452987baf3e39cc17d18bbb79055
SHA179b6375eef535ea345dab830bcf25ee5b70dd8f7
SHA256b3701eb6fecc5afdd6f22dc6995318b87991ccdf978d5c7393978741a272ab33
SHA512577cd1b5c0d453e9fe19052e79f4da8d5f2f5fef4d50c1ffdba467026df99b5c84a39904d64adc19619916dba072e75e5ac5d49ee076dd07e7f8a27dda8e95f1