Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
Monero30705edgeexe.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Monero30705edgeexe.exe
Resource
win10v2004-20231222-en
General
-
Target
Monero30705edgeexe.exe
-
Size
2.6MB
-
MD5
8665ea7a297abe90559362460f2ce3a0
-
SHA1
db51d44010a656007628472533c1f052f2aec3e6
-
SHA256
530d34800b671af8c4164660fb50475fb55acc031c93cd17213c24b4e132efbb
-
SHA512
55f6ad6d89f314436b169210a2534021d941f1fcd27d58a92a464c8d268fba4d765173aa21c95dedd1cf17c80f79e71de142d98fd0955ed8f9bb5906c9f6c033
-
SSDEEP
49152:b0oOoSqywDNmGUTCqP3XLn8eN0a2a8JAclbN7rIHIiY5lM3AW6leD8gxf5C73hr3:vOoSqywIaqP378eN0ZAclbN7rIHIRlMg
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/2736-18-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2736-19-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2736-21-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2736-23-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2736-25-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2736-24-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2736-22-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2736-26-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2736-27-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 484 Process not Found 1932 EdgeUpdate.exe -
Loads dropped DLL 1 IoCs
pid Process 484 Process not Found -
resource yara_rule behavioral1/memory/2736-14-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-18-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-19-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-21-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-23-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-25-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-24-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-22-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-15-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-12-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-26-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2736-27-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1932 set thread context of 2628 1932 EdgeUpdate.exe 38 PID 1932 set thread context of 2736 1932 EdgeUpdate.exe 37 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1820 sc.exe 2216 sc.exe 2864 sc.exe 1976 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 Monero30705edgeexe.exe 2028 Monero30705edgeexe.exe 2028 Monero30705edgeexe.exe 2028 Monero30705edgeexe.exe 1932 EdgeUpdate.exe 1932 EdgeUpdate.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 2736 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2628 1932 EdgeUpdate.exe 38 PID 1932 wrote to memory of 2628 1932 EdgeUpdate.exe 38 PID 1932 wrote to memory of 2628 1932 EdgeUpdate.exe 38 PID 1932 wrote to memory of 2628 1932 EdgeUpdate.exe 38 PID 1932 wrote to memory of 2628 1932 EdgeUpdate.exe 38 PID 1932 wrote to memory of 2628 1932 EdgeUpdate.exe 38 PID 1932 wrote to memory of 2628 1932 EdgeUpdate.exe 38 PID 1932 wrote to memory of 2628 1932 EdgeUpdate.exe 38 PID 1932 wrote to memory of 2628 1932 EdgeUpdate.exe 38 PID 1932 wrote to memory of 2736 1932 EdgeUpdate.exe 37 PID 1932 wrote to memory of 2736 1932 EdgeUpdate.exe 37 PID 1932 wrote to memory of 2736 1932 EdgeUpdate.exe 37 PID 1932 wrote to memory of 2736 1932 EdgeUpdate.exe 37 PID 1932 wrote to memory of 2736 1932 EdgeUpdate.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Monero30705edgeexe.exe"C:\Users\Admin\AppData\Local\Temp\Monero30705edgeexe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "EdgeUpdate"2⤵
- Launches sc.exe
PID:2864
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "EdgeUpdate" binpath= "C:\ProgramData\Microsoft\EdgeUpdate\Log\EdgeUpdate.exe" start= "auto"2⤵
- Launches sc.exe
PID:1976
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:1820
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "EdgeUpdate"2⤵
- Launches sc.exe
PID:2216
-
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\EdgeUpdate.exeC:\ProgramData\Microsoft\EdgeUpdate\Log\EdgeUpdate.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD527c5f6b519929b1a4af846f31daa2674
SHA136b60a8f96a6431635de3f36298cfbd8fe674527
SHA25696572c3361356cf4bbc0f1472611d3c0a134673c6b92de964a9086acae96f17e
SHA51263ce67786a99cd825b6b26fb67c22ddac44d80587f377c5f328f10fb3e090ae4bc126892d43918a657ad248766b75e461350e91d08d686ea208b85cdb9583879
-
Filesize
1.6MB
MD5249daa85fcffde4f300d0c6877b5d4fa
SHA1285e140090168049a092ee86e85da522857071e6
SHA25641e404d6c6a4994b0373f568afd53434598c52766e2e0401bc437a792f98fa14
SHA512dd7c32e3ab5e24b1aaba97d35df9318e347c396c26d4e153f2f5216e227ea21d4412e308353830635a68a173b8b9694e9539a6ea46f7242ba9071b1b0a011bd4
-
Filesize
1.2MB
MD596ae3126fddce8f185bf3a0b25eb159c
SHA199eb05451782e331f14992160f678db660492116
SHA256eb461df8575885fd0cd3c00633a8a7e21b6bfae7ac850b373ed4034e96dbc45a
SHA512d5b29421faa1a0f9de33ed1589015c4e8ce06ea44c9f31b670e5887f5a6fb5eab700c9788e4c67e5d0218623badeee992302af24d82d9a5bbc7fe13e89101380
-
Filesize
1.2MB
MD5c5bcb0ddd35b73c72bab8e8ce6744812
SHA17c2b25d9cd96ae6921427d38672fc6728295a336
SHA25688b74a3da556615c98859798630f7396f0ad7cf7c3b7c6196df8f31ee8bf454b
SHA512cc1957ca1db10efd2ad3043c73ee6cfa9d905837bfb1fd30f70c4390e6f53c5a019a5db588b32fe90f846f68fc39a90b5a0080b08aaf42823b448027acf409a2