Analysis

  • max time kernel
    238s
  • max time network
    294s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/01/2024, 22:21

General

  • Target

    677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12.exe

  • Size

    2.5MB

  • MD5

    ffada57f998ed6a72b6ba2f072d2690a

  • SHA1

    6857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f

  • SHA256

    677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12

  • SHA512

    1de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f

  • SSDEEP

    49152:UjBP3/qGrdNJ8VZFhY++Yk/4aLq8wH7mm6qJsSRRjyl:aBPvfrAZF28k/RLbwH7mvcRRjy

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 9 IoCs
  • Creates new service(s) 1 TTPs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12.exe
    "C:\Users\Admin\AppData\Local\Temp\677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3392
    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4520
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop UsoSvc
      2⤵
      • Launches sc.exe
      PID:2212
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4424
      • C:\Windows\system32\wusa.exe
        wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
          PID:4028
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop WaaSMedicSvc
        2⤵
        • Launches sc.exe
        PID:3372
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop wuauserv
        2⤵
        • Launches sc.exe
        PID:4772
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop bits
        2⤵
        • Launches sc.exe
        PID:4440
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop dosvc
        2⤵
        • Launches sc.exe
        PID:4812
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2896
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe delete "WSNKISKT"
        2⤵
        • Launches sc.exe
        PID:3760
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1500
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4004
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"
        2⤵
        • Launches sc.exe
        PID:4076
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop eventlog
        2⤵
        • Launches sc.exe
        PID:4364
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start "WSNKISKT"
        2⤵
        • Launches sc.exe
        PID:5064
    • C:\ProgramData\wikombernizc\reakuqnanrkn.exe
      C:\ProgramData\wikombernizc\reakuqnanrkn.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        2⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1560
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop WaaSMedicSvc
        2⤵
        • Launches sc.exe
        PID:436
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop UsoSvc
        2⤵
        • Launches sc.exe
        PID:4512
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2940
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop bits
        2⤵
        • Launches sc.exe
        PID:604
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop dosvc
        2⤵
        • Launches sc.exe
        PID:4296
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop wuauserv
        2⤵
        • Launches sc.exe
        PID:4372
      • C:\Windows\explorer.exe
        explorer.exe
        2⤵
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:824
      • C:\Windows\system32\conhost.exe
        C:\Windows\system32\conhost.exe
        2⤵
          PID:2300
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1616
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4520
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4132
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4052
      • C:\Windows\system32\wusa.exe
        wusa /uninstall /kb:890830 /quiet /norestart
        1⤵
          PID:3544

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\wikombernizc\reakuqnanrkn.exe

                Filesize

                1.7MB

                MD5

                f3768cc25cdd0cd405f1e5c125a4a8cd

                SHA1

                b060f60a86ee74df33fa7f27ba9ab9e3d710cdc9

                SHA256

                df2158b41c3b47245c34f4f8d3461135b1c01bcf216f9915b1e91668273f0c42

                SHA512

                0394495e7d9f89587ed569c918c24b4fdeecfa122724ce92886b143c83b29a54cbe7bb77e4aa91d61e7f576d5337cb69cd8de2331db9232410f7d75b437c59f3

              • C:\ProgramData\wikombernizc\reakuqnanrkn.exe

                Filesize

                2.5MB

                MD5

                ffada57f998ed6a72b6ba2f072d2690a

                SHA1

                6857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f

                SHA256

                677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12

                SHA512

                1de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y2pswqx5.5lq.ps1

                Filesize

                1B

                MD5

                c4ca4238a0b923820dcc509a6f75849b

                SHA1

                356a192b7913b04c54574d18c28d46e6395428ab

                SHA256

                6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                SHA512

                4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

              • memory/824-229-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-227-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-219-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-234-0x0000000012600000-0x0000000012640000-memory.dmp

                Filesize

                256KB

              • memory/824-231-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-230-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-236-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-238-0x00000000025D0000-0x00000000025F0000-memory.dmp

                Filesize

                128KB

              • memory/824-235-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-237-0x00000000025D0000-0x00000000025F0000-memory.dmp

                Filesize

                128KB

              • memory/824-228-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-226-0x0000000001710000-0x0000000001730000-memory.dmp

                Filesize

                128KB

              • memory/824-225-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-224-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-223-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-222-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-221-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/824-220-0x0000000140000000-0x0000000140848000-memory.dmp

                Filesize

                8.3MB

              • memory/1560-59-0x0000020068CF0000-0x0000020068D00000-memory.dmp

                Filesize

                64KB

              • memory/1560-119-0x0000020068ED0000-0x0000020068EDA000-memory.dmp

                Filesize

                40KB

              • memory/1560-58-0x00007FFEC7150000-0x00007FFEC7B3C000-memory.dmp

                Filesize

                9.9MB

              • memory/1560-60-0x0000020068CF0000-0x0000020068D00000-memory.dmp

                Filesize

                64KB

              • memory/1560-80-0x0000020068EB0000-0x0000020068ECC000-memory.dmp

                Filesize

                112KB

              • memory/1560-79-0x00007FF6A8480000-0x00007FF6A8490000-memory.dmp

                Filesize

                64KB

              • memory/1560-86-0x00000200693A0000-0x0000020069459000-memory.dmp

                Filesize

                740KB

              • memory/1560-210-0x00007FFEC7150000-0x00007FFEC7B3C000-memory.dmp

                Filesize

                9.9MB

              • memory/1560-176-0x0000020068CF0000-0x0000020068D00000-memory.dmp

                Filesize

                64KB

              • memory/1560-177-0x0000020068CF0000-0x0000020068D00000-memory.dmp

                Filesize

                64KB

              • memory/2300-212-0x0000000140000000-0x000000014000E000-memory.dmp

                Filesize

                56KB

              • memory/2300-213-0x0000000140000000-0x000000014000E000-memory.dmp

                Filesize

                56KB

              • memory/2300-218-0x0000000140000000-0x000000014000E000-memory.dmp

                Filesize

                56KB

              • memory/2300-211-0x0000000140000000-0x000000014000E000-memory.dmp

                Filesize

                56KB

              • memory/2300-215-0x0000000140000000-0x000000014000E000-memory.dmp

                Filesize

                56KB

              • memory/2300-214-0x0000000140000000-0x000000014000E000-memory.dmp

                Filesize

                56KB

              • memory/4520-50-0x00007FFEC7150000-0x00007FFEC7B3C000-memory.dmp

                Filesize

                9.9MB

              • memory/4520-4-0x000002416A910000-0x000002416A932000-memory.dmp

                Filesize

                136KB

              • memory/4520-46-0x000002416AE80000-0x000002416AE90000-memory.dmp

                Filesize

                64KB

              • memory/4520-23-0x000002416AE80000-0x000002416AE90000-memory.dmp

                Filesize

                64KB

              • memory/4520-10-0x000002416AF90000-0x000002416B006000-memory.dmp

                Filesize

                472KB

              • memory/4520-9-0x000002416AE80000-0x000002416AE90000-memory.dmp

                Filesize

                64KB

              • memory/4520-7-0x000002416AE80000-0x000002416AE90000-memory.dmp

                Filesize

                64KB

              • memory/4520-6-0x00007FFEC7150000-0x00007FFEC7B3C000-memory.dmp

                Filesize

                9.9MB