Analysis
-
max time kernel
122s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 23:24
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231222-en
General
-
Target
file.exe
-
Size
2.5MB
-
MD5
f44f200e7d7f8ae6035b382a2a4240dd
-
SHA1
8f11e6d44050813db4aa6ba0971ab873cc3ad797
-
SHA256
a8ae29395e8234f4d2a35a88ff8d34b353c716d81d0d7e05eacc5d4e2a2aacc8
-
SHA512
193781602d1768e170dd9ed149fd07fe72f84789a7d25fe59ad62555f381e7470b4d30866609cf4a387834ed7fda7a2a552d8654117c5dea5cf3288b58c68a39
-
SSDEEP
49152:3hU0Vy41dosEvIMf9FhcBYFUjeCnfDCvNb2aeP4mN:RU0zPoTvIYnh8vIlq
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/2996-10-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2996-11-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2996-13-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2996-14-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2996-16-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2996-17-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2996-15-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2996-18-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2996-19-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 484 Process not Found 2752 smazgcisoglo.exe -
Loads dropped DLL 1 IoCs
pid Process 484 Process not Found -
resource yara_rule behavioral1/memory/2996-5-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-6-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-9-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-8-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-10-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-11-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-7-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-13-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-14-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-15-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-18-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2996-19-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 2996 2752 smazgcisoglo.exe 34 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1728 sc.exe 2112 sc.exe 2656 sc.exe 2372 sc.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2516 file.exe 2516 file.exe 2516 file.exe 2516 file.exe 2752 smazgcisoglo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 2996 explorer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2996 2752 smazgcisoglo.exe 34 PID 2752 wrote to memory of 2996 2752 smazgcisoglo.exe 34 PID 2752 wrote to memory of 2996 2752 smazgcisoglo.exe 34 PID 2752 wrote to memory of 2996 2752 smazgcisoglo.exe 34 PID 2752 wrote to memory of 2996 2752 smazgcisoglo.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "XGRXZRAP"2⤵
- Launches sc.exe
PID:1728
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "XGRXZRAP" binpath= "C:\ProgramData\wdkmvkocxuib\smazgcisoglo.exe" start= "auto"2⤵
- Launches sc.exe
PID:2112
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "XGRXZRAP"2⤵
- Launches sc.exe
PID:2656
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2372
-
-
C:\ProgramData\wdkmvkocxuib\smazgcisoglo.exeC:\ProgramData\wdkmvkocxuib\smazgcisoglo.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5583e1ec0f81b676b16ecd01e1ebb2784
SHA1389cb06fea8460e141ffd206fc044e86c4889760
SHA2560b98ac5787d5a27eab2f3518ab64dfb3de4582f625fc8f64e53bec896791cba2
SHA512c9d78c5079359c879e101128146485281790fe37895fb78e4faacbe72591458080a8d949351bc1af5a9d9a367269749772db5bd0954f256a6501e0ecaa7e48d1
-
Filesize
553KB
MD531f3cd2acd72b191a71880fcba081e93
SHA16823fc38e02e1c5bdaf45e0474a193b8b6593974
SHA256263c6c9a2f7d4e6ef5dd888de673d8e6ca5b2bdd1933ea4d5e86a4e2d62c26b0
SHA512c9647188361bd54277add2074d070197535e7bfff3608bc015a4986446c904cd5e1e598b965b45d549d75d18ce34c516c05cb32281a55248213420d5f27ca6ba
-
Filesize
419KB
MD50042c0a6e60200e6807e8475e57a2f8b
SHA1fb7ac7dfc67913347717c972bc106d1d7a3027d9
SHA2566e10a4bb94b15ae4adefd98dda7a5cfe764a896a5d536068240ac4a3ccc4b283
SHA512d1aaa4cbf4be10922b5147d4529a17f0df6e91101ba44d444f1733a0af983550c28fe6a0c7fddcb2305e3d1d8dd68cc63109880fd863d0b4662f1dfe82e0c347