Analysis

  • max time kernel
    80s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 20:28

General

  • Target

    Monero30705edgeexe.exe

  • Size

    2.6MB

  • MD5

    8665ea7a297abe90559362460f2ce3a0

  • SHA1

    db51d44010a656007628472533c1f052f2aec3e6

  • SHA256

    530d34800b671af8c4164660fb50475fb55acc031c93cd17213c24b4e132efbb

  • SHA512

    55f6ad6d89f314436b169210a2534021d941f1fcd27d58a92a464c8d268fba4d765173aa21c95dedd1cf17c80f79e71de142d98fd0955ed8f9bb5906c9f6c033

  • SSDEEP

    49152:b0oOoSqywDNmGUTCqP3XLn8eN0a2a8JAclbN7rIHIiY5lM3AW6leD8gxf5C73hr3:vOoSqywIaqP378eN0ZAclbN7rIHIRlMg

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 9 IoCs
  • Creates new service(s) 1 TTPs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Monero30705edgeexe.exe
    "C:\Users\Admin\AppData\Local\Temp\Monero30705edgeexe.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2548
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start "EdgeUpdate"
      2⤵
      • Launches sc.exe
      PID:4076
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop eventlog
      2⤵
      • Launches sc.exe
      PID:3088
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe create "EdgeUpdate" binpath= "C:\ProgramData\Microsoft\EdgeUpdate\Log\EdgeUpdate.exe" start= "auto"
      2⤵
      • Launches sc.exe
      PID:336
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe delete "EdgeUpdate"
      2⤵
      • Launches sc.exe
      PID:2220
  • C:\ProgramData\Microsoft\EdgeUpdate\Log\EdgeUpdate.exe
    C:\ProgramData\Microsoft\EdgeUpdate\Log\EdgeUpdate.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Windows\explorer.exe
      explorer.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3416
    • C:\Windows\system32\conhost.exe
      C:\Windows\system32\conhost.exe
      2⤵
        PID:2488

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2488-10-0x0000000140000000-0x000000014000D000-memory.dmp

      Filesize

      52KB

    • memory/2488-3-0x0000000140000000-0x000000014000D000-memory.dmp

      Filesize

      52KB

    • memory/2488-4-0x0000000140000000-0x000000014000D000-memory.dmp

      Filesize

      52KB

    • memory/2488-5-0x0000000140000000-0x000000014000D000-memory.dmp

      Filesize

      52KB

    • memory/2488-6-0x0000000140000000-0x000000014000D000-memory.dmp

      Filesize

      52KB

    • memory/2488-7-0x0000000140000000-0x000000014000D000-memory.dmp

      Filesize

      52KB

    • memory/3416-21-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-19-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-22-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-18-0x00000000012D0000-0x00000000012F0000-memory.dmp

      Filesize

      128KB

    • memory/3416-16-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-15-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-13-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-12-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-20-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-23-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-17-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-14-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-11-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-24-0x0000000001340000-0x0000000001360000-memory.dmp

      Filesize

      128KB

    • memory/3416-25-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-27-0x00000000021D0000-0x00000000021F0000-memory.dmp

      Filesize

      128KB

    • memory/3416-26-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/3416-28-0x00000000021D0000-0x00000000021F0000-memory.dmp

      Filesize

      128KB