Analysis
-
max time kernel
80s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
Monero30705edgeexe.exe
Resource
win7-20231129-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
Monero30705edgeexe.exe
Resource
win10v2004-20231222-en
11 signatures
150 seconds
General
-
Target
Monero30705edgeexe.exe
-
Size
2.6MB
-
MD5
8665ea7a297abe90559362460f2ce3a0
-
SHA1
db51d44010a656007628472533c1f052f2aec3e6
-
SHA256
530d34800b671af8c4164660fb50475fb55acc031c93cd17213c24b4e132efbb
-
SHA512
55f6ad6d89f314436b169210a2534021d941f1fcd27d58a92a464c8d268fba4d765173aa21c95dedd1cf17c80f79e71de142d98fd0955ed8f9bb5906c9f6c033
-
SSDEEP
49152:b0oOoSqywDNmGUTCqP3XLn8eN0a2a8JAclbN7rIHIiY5lM3AW6leD8gxf5C73hr3:vOoSqywIaqP378eN0ZAclbN7rIHIRlMg
Score
10/10
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/3416-17-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3416-19-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3416-20-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3416-21-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3416-23-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3416-22-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3416-16-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3416-25-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3416-26-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4656 EdgeUpdate.exe -
resource yara_rule behavioral2/memory/3416-11-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-14-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-19-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-20-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-21-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-23-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-22-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-15-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-13-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-12-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-25-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3416-26-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4656 set thread context of 2488 4656 EdgeUpdate.exe 100 PID 4656 set thread context of 3416 4656 EdgeUpdate.exe 99 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4076 sc.exe 3088 sc.exe 336 sc.exe 2220 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2548 Monero30705edgeexe.exe 2548 Monero30705edgeexe.exe 2548 Monero30705edgeexe.exe 2548 Monero30705edgeexe.exe 4656 EdgeUpdate.exe 4656 EdgeUpdate.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe 3416 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 3416 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4656 wrote to memory of 2488 4656 EdgeUpdate.exe 100 PID 4656 wrote to memory of 2488 4656 EdgeUpdate.exe 100 PID 4656 wrote to memory of 2488 4656 EdgeUpdate.exe 100 PID 4656 wrote to memory of 2488 4656 EdgeUpdate.exe 100 PID 4656 wrote to memory of 2488 4656 EdgeUpdate.exe 100 PID 4656 wrote to memory of 2488 4656 EdgeUpdate.exe 100 PID 4656 wrote to memory of 2488 4656 EdgeUpdate.exe 100 PID 4656 wrote to memory of 2488 4656 EdgeUpdate.exe 100 PID 4656 wrote to memory of 2488 4656 EdgeUpdate.exe 100 PID 4656 wrote to memory of 3416 4656 EdgeUpdate.exe 99 PID 4656 wrote to memory of 3416 4656 EdgeUpdate.exe 99 PID 4656 wrote to memory of 3416 4656 EdgeUpdate.exe 99 PID 4656 wrote to memory of 3416 4656 EdgeUpdate.exe 99 PID 4656 wrote to memory of 3416 4656 EdgeUpdate.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Monero30705edgeexe.exe"C:\Users\Admin\AppData\Local\Temp\Monero30705edgeexe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "EdgeUpdate"2⤵
- Launches sc.exe
PID:4076
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:3088
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "EdgeUpdate" binpath= "C:\ProgramData\Microsoft\EdgeUpdate\Log\EdgeUpdate.exe" start= "auto"2⤵
- Launches sc.exe
PID:336
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "EdgeUpdate"2⤵
- Launches sc.exe
PID:2220
-
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\EdgeUpdate.exeC:\ProgramData\Microsoft\EdgeUpdate\Log\EdgeUpdate.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2488
-