Analysis
-
max time kernel
91s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231222-en
General
-
Target
file.exe
-
Size
2.5MB
-
MD5
f44f200e7d7f8ae6035b382a2a4240dd
-
SHA1
8f11e6d44050813db4aa6ba0971ab873cc3ad797
-
SHA256
a8ae29395e8234f4d2a35a88ff8d34b353c716d81d0d7e05eacc5d4e2a2aacc8
-
SHA512
193781602d1768e170dd9ed149fd07fe72f84789a7d25fe59ad62555f381e7470b4d30866609cf4a387834ed7fda7a2a552d8654117c5dea5cf3288b58c68a39
-
SSDEEP
49152:3hU0Vy41dosEvIMf9FhcBYFUjeCnfDCvNb2aeP4mN:RU0zPoTvIYnh8vIlq
Malware Config
Signatures
-
XMRig Miner payload 13 IoCs
Processes:
resource yara_rule behavioral2/memory/4028-9-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-10-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-12-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-13-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-14-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-15-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-16-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-17-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-18-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-20-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-21-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-22-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4028-23-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
smazgcisoglo.exepid process 2100 smazgcisoglo.exe -
Processes:
resource yara_rule behavioral2/memory/4028-4-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-5-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-6-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-8-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-7-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-9-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-10-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-12-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-13-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-14-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-15-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-18-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-20-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-21-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-22-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4028-23-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
smazgcisoglo.exedescription pid process target process PID 2100 set thread context of 4028 2100 smazgcisoglo.exe explorer.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 4652 sc.exe 1088 sc.exe 4800 sc.exe 1960 sc.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
file.exesmazgcisoglo.exepid process 812 file.exe 812 file.exe 812 file.exe 812 file.exe 2100 smazgcisoglo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
explorer.exedescription pid process Token: SeLockMemoryPrivilege 4028 explorer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
smazgcisoglo.exedescription pid process target process PID 2100 wrote to memory of 4028 2100 smazgcisoglo.exe explorer.exe PID 2100 wrote to memory of 4028 2100 smazgcisoglo.exe explorer.exe PID 2100 wrote to memory of 4028 2100 smazgcisoglo.exe explorer.exe PID 2100 wrote to memory of 4028 2100 smazgcisoglo.exe explorer.exe PID 2100 wrote to memory of 4028 2100 smazgcisoglo.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:812 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "XGRXZRAP"2⤵
- Launches sc.exe
PID:1960
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "XGRXZRAP" binpath= "C:\ProgramData\wdkmvkocxuib\smazgcisoglo.exe" start= "auto"2⤵
- Launches sc.exe
PID:4652
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "XGRXZRAP"2⤵
- Launches sc.exe
PID:1088
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:4800
-
-
C:\ProgramData\wdkmvkocxuib\smazgcisoglo.exeC:\ProgramData\wdkmvkocxuib\smazgcisoglo.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD57245206821acc6d23911633c24a239bb
SHA1d8c466c0da33eef7eeed35e502aff1cdc5431aaa
SHA2567b378351a7361d15d1af1b783d9b35ddc9b77327f2a4bbab3a6951a605783787
SHA512106c0d4a0d9cc34fc038c9d3214d863d7df8f91403de31f3bb9578ebb4c493712ba37ed334752a41572335f019479bb21ae70e66a19cf66ca987935c9a9e12af
-
Filesize
1.7MB
MD5340bb1d43a3dadd32bfa123603a608ee
SHA12386e5e7abb20130f99334c512f648375ac3853f
SHA25604a3155d5400e07e68c26bda8b7c46a19240452ba777e7c6e581d69c2adc8e8e
SHA5127917b1d8ccf3d14332eb2518c1a7329ccf5966fcab165786bcbb8eb75932653e5e88f8fb582747c478fb8fa12051cf9ed8c4c9308c855b77fbf9968ec4f8cdcd