Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231222-en
General
-
Target
tmp.exe
-
Size
6.4MB
-
MD5
2eafb4926d78feb0b61d5b995d0fe6ee
-
SHA1
f6e75678f1dafcb18408452ea948b9ad51b5d83e
-
SHA256
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30
-
SHA512
1885f5874c44a6841be4d53140ad63304e8d1924bb98fe14602d884fbc289ec8913db772a9e2db93e45298d1328700e2000ddab109af3964eaf6f23af61ef78e
-
SSDEEP
196608:1pznZ/ySos+NnrlQ5jrNoIgDJ0I6x/oAP:1pDZk9LQ5vNdeJ0IC
Malware Config
Signatures
-
XMRig Miner payload 16 IoCs
Processes:
resource yara_rule behavioral2/memory/1048-15-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-16-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-17-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-19-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-18-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-21-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-22-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-20-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-24-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-28-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-27-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-29-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-30-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-31-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-33-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1048-34-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
iojmibhyhiws.exetmp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tmp.exe -
Executes dropped EXE 1 IoCs
Processes:
iojmibhyhiws.exepid process 2360 iojmibhyhiws.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
iojmibhyhiws.exedescription pid process target process PID 2360 set thread context of 2196 2360 iojmibhyhiws.exe conhost.exe PID 2360 set thread context of 1048 2360 iojmibhyhiws.exe conhost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 1040 sc.exe 412 sc.exe 1808 sc.exe 1504 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tmp.exeiojmibhyhiws.execonhost.exepid process 516 tmp.exe 516 tmp.exe 516 tmp.exe 516 tmp.exe 516 tmp.exe 2360 iojmibhyhiws.exe 2360 iojmibhyhiws.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe 1048 conhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
conhost.exedescription pid process Token: SeLockMemoryPrivilege 1048 conhost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
cmd.exeiojmibhyhiws.exedescription pid process target process PID 816 wrote to memory of 4828 816 cmd.exe choice.exe PID 816 wrote to memory of 4828 816 cmd.exe choice.exe PID 2360 wrote to memory of 2196 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 2196 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 2196 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 2196 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 2196 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 2196 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 2196 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 2196 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 2196 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe PID 2360 wrote to memory of 1048 2360 iojmibhyhiws.exe conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: EnumeratesProcesses
PID:516 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FLWCUERA"2⤵
- Launches sc.exe
PID:1040
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"2⤵
- Launches sc.exe
PID:412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:4828
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "FLWCUERA"2⤵
- Launches sc.exe
PID:1808
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:1504
-
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeC:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2196
-
-
C:\Windows\system32\conhost.execonhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
451KB
MD526361799f681527faed4fdda35ea4c04
SHA1d5dd56b73e18a78d45eab9ec5cf2ee9a6f579013
SHA256d71162cf89b941f010d7160c692bc0a012d25540d162d7d7375219d7c79d3c9f
SHA5123d5fe0b9a0de180e3ed2b36f2dc9607f804af6fd988b002690d838a27796905915f3c758e857e06e2838e052e5d2e7385ce5d0ad28a34e1e76dfc97ec6ad87c7
-
Filesize
553KB
MD5619bb6bf7d5b25af646fb985a5de73f6
SHA1b38c19865f651d29b6ad6f8320b648c2cb17da4f
SHA256e7684466ce1a7098ea859e3f2f6fc2cb5001ed29ed19a7bb41664f88145c4c65
SHA512a5356e0bc140115a2b8d952896ddc77665c8343b59aea7d757f5d36c73fe88c8bf281e521aeebdbc461d382edc4503838fbafbe7d45964297270d97620a3bffd