Analysis
-
max time kernel
300s -
max time network
309s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
06-03-2024 04:49
Static task
static1
Behavioral task
behavioral1
Sample
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe
Resource
win10-20240221-en
General
-
Target
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe
-
Size
10.4MB
-
MD5
dff762abefd2ac634f87aacd920c8bdc
-
SHA1
b8ea30c9d631fbb4a1f57c2873ca8aeb64c93643
-
SHA256
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c
-
SHA512
54db97efb4ffcec9bc4122a6e41029c3cd457b631ede685eb883d5884f5a7b90c465dc8ec2212e712af935481073a2b4eb5180431926f03febccb055d9585341
-
SSDEEP
196608:D2neZjvDa5N5o9LrIbQTsbHu7THe8FhG8ryPzB3SFyFYha:D3/AU9LrIdb+THVFg8uhSYFYha
Malware Config
Signatures
-
XMRig Miner payload 16 IoCs
Processes:
resource yara_rule behavioral2/memory/3676-21-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-22-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-23-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-24-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-25-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-26-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-27-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-28-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-30-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-33-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-34-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-35-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-36-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-37-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-41-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/3676-42-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
todymdgvwmgb.exepid process 1072 todymdgvwmgb.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
todymdgvwmgb.exedescription pid process target process PID 1072 set thread context of 1660 1072 todymdgvwmgb.exe conhost.exe PID 1072 set thread context of 3676 1072 todymdgvwmgb.exe svchost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2072 sc.exe 3424 sc.exe 3656 sc.exe 3764 sc.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exetodymdgvwmgb.exepid process 4612 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 4612 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 4612 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 4612 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 4612 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 4612 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 4612 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 4612 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 4612 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 4612 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 1072 todymdgvwmgb.exe 1072 todymdgvwmgb.exe 1072 todymdgvwmgb.exe 1072 todymdgvwmgb.exe 1072 todymdgvwmgb.exe 1072 todymdgvwmgb.exe 1072 todymdgvwmgb.exe 1072 todymdgvwmgb.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 636 -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exesvchost.exedescription pid process Token: SeShutdownPrivilege 4124 powercfg.exe Token: SeCreatePagefilePrivilege 4124 powercfg.exe Token: SeShutdownPrivilege 1632 powercfg.exe Token: SeCreatePagefilePrivilege 1632 powercfg.exe Token: SeShutdownPrivilege 1120 powercfg.exe Token: SeCreatePagefilePrivilege 1120 powercfg.exe Token: SeShutdownPrivilege 4344 powercfg.exe Token: SeCreatePagefilePrivilege 4344 powercfg.exe Token: SeShutdownPrivilege 3052 powercfg.exe Token: SeCreatePagefilePrivilege 3052 powercfg.exe Token: SeShutdownPrivilege 4308 powercfg.exe Token: SeCreatePagefilePrivilege 4308 powercfg.exe Token: SeShutdownPrivilege 4860 powercfg.exe Token: SeCreatePagefilePrivilege 4860 powercfg.exe Token: SeShutdownPrivilege 2152 powercfg.exe Token: SeCreatePagefilePrivilege 2152 powercfg.exe Token: SeLockMemoryPrivilege 3676 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
todymdgvwmgb.exedescription pid process target process PID 1072 wrote to memory of 1660 1072 todymdgvwmgb.exe conhost.exe PID 1072 wrote to memory of 1660 1072 todymdgvwmgb.exe conhost.exe PID 1072 wrote to memory of 1660 1072 todymdgvwmgb.exe conhost.exe PID 1072 wrote to memory of 1660 1072 todymdgvwmgb.exe conhost.exe PID 1072 wrote to memory of 1660 1072 todymdgvwmgb.exe conhost.exe PID 1072 wrote to memory of 1660 1072 todymdgvwmgb.exe conhost.exe PID 1072 wrote to memory of 1660 1072 todymdgvwmgb.exe conhost.exe PID 1072 wrote to memory of 1660 1072 todymdgvwmgb.exe conhost.exe PID 1072 wrote to memory of 1660 1072 todymdgvwmgb.exe conhost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe PID 1072 wrote to memory of 3676 1072 todymdgvwmgb.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe"C:\Users\Admin\AppData\Local\Temp\33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "PHSWJLZY"2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "PHSWJLZY" binpath= "C:\ProgramData\jndraacsywhc\todymdgvwmgb.exe" start= "auto"2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "PHSWJLZY"2⤵
- Launches sc.exe
-
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exeC:\ProgramData\jndraacsywhc\todymdgvwmgb.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exeFilesize
9.4MB
MD51a812452f8928f73f7dd8f5a82663509
SHA15df17717bf4a0ec87c056098afb32c3b2ffdfcbc
SHA256e458b01f62e0baabaa4fe30a1bdfaa884ed6226e3d846771532e1c3fe98f44e9
SHA51267a590bfa17cf08b4c4df4afcea3712928a0f3729967c6fd86e6f94661913219d446b2823166c04b0fd4a00a6916ade3bb566016daaf02e85d133596bd16665c
-
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exeFilesize
8.0MB
MD5176d16b0f53a7d6a3d93cd0d62cdf110
SHA19207c54d64639fd2d52a9713a47792074c817913
SHA256f55bc0403fb93e8f4900b39843016fe56a22d22a0f9a642ca23a0caa0f1a1e1a
SHA512c977868817cfc740aa32f0d2707d88702ad149199296ac595bfc74fe0da3b7872574c9d9e3428ca3427e61e28d88db28912412c3ec4d8bb51f4c1a741f390713
-
memory/1072-10-0x0000000140000000-0x000000014199B000-memory.dmpFilesize
25.6MB
-
memory/1072-32-0x0000000140000000-0x000000014199B000-memory.dmpFilesize
25.6MB
-
memory/1072-9-0x0000000140000000-0x000000014199B000-memory.dmpFilesize
25.6MB
-
memory/1660-13-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1660-16-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1660-12-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1660-19-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1660-14-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1660-15-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3676-27-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-30-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-20-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-21-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-22-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-23-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-24-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-25-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-26-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-44-0x000001DC6DCC0000-0x000001DC6DCE0000-memory.dmpFilesize
128KB
-
memory/3676-28-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-43-0x000001DC6DCC0000-0x000001DC6DCE0000-memory.dmpFilesize
128KB
-
memory/3676-31-0x000001DC6DBF0000-0x000001DC6DC10000-memory.dmpFilesize
128KB
-
memory/3676-42-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-33-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-34-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-35-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-36-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-37-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/3676-40-0x000001DC6DC80000-0x000001DC6DCC0000-memory.dmpFilesize
256KB
-
memory/3676-41-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4612-2-0x0000000140000000-0x000000014199B000-memory.dmpFilesize
25.6MB
-
memory/4612-0-0x00007FFAADAF0000-0x00007FFAADAF2000-memory.dmpFilesize
8KB
-
memory/4612-5-0x0000000140000000-0x000000014199B000-memory.dmpFilesize
25.6MB