Analysis
-
max time kernel
159s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240226-en
General
-
Target
tmp.exe
-
Size
10.4MB
-
MD5
dff762abefd2ac634f87aacd920c8bdc
-
SHA1
b8ea30c9d631fbb4a1f57c2873ca8aeb64c93643
-
SHA256
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c
-
SHA512
54db97efb4ffcec9bc4122a6e41029c3cd457b631ede685eb883d5884f5a7b90c465dc8ec2212e712af935481073a2b4eb5180431926f03febccb055d9585341
-
SSDEEP
196608:D2neZjvDa5N5o9LrIbQTsbHu7THe8FhG8ryPzB3SFyFYha:D3/AU9LrIdb+THVFg8uhSYFYha
Malware Config
Signatures
-
XMRig Miner payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/2044-35-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-36-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-37-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-38-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-39-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-40-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-41-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-42-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-45-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-49-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-50-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-51-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-52-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-53-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-67-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2044-68-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 3 IoCs
Processes:
todymdgvwmgb.exetodymdgvwmgb.exepid process 468 2468 todymdgvwmgb.exe 1932 todymdgvwmgb.exe -
Loads dropped DLL 1 IoCs
Processes:
pid process 468 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
todymdgvwmgb.exedescription pid process target process PID 2468 set thread context of 560 2468 todymdgvwmgb.exe conhost.exe PID 2468 set thread context of 2044 2468 todymdgvwmgb.exe svchost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2596 sc.exe 2540 sc.exe 2696 sc.exe 2804 sc.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
tmp.exetodymdgvwmgb.execonhost.exetodymdgvwmgb.exepid process 2132 tmp.exe 2132 tmp.exe 2132 tmp.exe 2132 tmp.exe 2132 tmp.exe 2132 tmp.exe 2132 tmp.exe 2132 tmp.exe 2132 tmp.exe 2468 todymdgvwmgb.exe 2468 todymdgvwmgb.exe 2468 todymdgvwmgb.exe 2468 todymdgvwmgb.exe 2468 todymdgvwmgb.exe 2468 todymdgvwmgb.exe 2468 todymdgvwmgb.exe 560 conhost.exe 1932 todymdgvwmgb.exe 1932 todymdgvwmgb.exe 1932 todymdgvwmgb.exe 1932 todymdgvwmgb.exe 1932 todymdgvwmgb.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 468 -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exesvchost.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeShutdownPrivilege 2284 powercfg.exe Token: SeShutdownPrivilege 2584 powercfg.exe Token: SeShutdownPrivilege 2624 powercfg.exe Token: SeShutdownPrivilege 2840 powercfg.exe Token: SeShutdownPrivilege 2744 powercfg.exe Token: SeShutdownPrivilege 2512 powercfg.exe Token: SeShutdownPrivilege 2768 powercfg.exe Token: SeShutdownPrivilege 1308 powercfg.exe Token: SeLockMemoryPrivilege 2044 svchost.exe Token: SeShutdownPrivilege 1904 powercfg.exe Token: SeShutdownPrivilege 1992 powercfg.exe Token: SeShutdownPrivilege 2304 powercfg.exe Token: SeShutdownPrivilege 1984 powercfg.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
todymdgvwmgb.exedescription pid process target process PID 2468 wrote to memory of 560 2468 todymdgvwmgb.exe conhost.exe PID 2468 wrote to memory of 560 2468 todymdgvwmgb.exe conhost.exe PID 2468 wrote to memory of 560 2468 todymdgvwmgb.exe conhost.exe PID 2468 wrote to memory of 560 2468 todymdgvwmgb.exe conhost.exe PID 2468 wrote to memory of 560 2468 todymdgvwmgb.exe conhost.exe PID 2468 wrote to memory of 560 2468 todymdgvwmgb.exe conhost.exe PID 2468 wrote to memory of 560 2468 todymdgvwmgb.exe conhost.exe PID 2468 wrote to memory of 560 2468 todymdgvwmgb.exe conhost.exe PID 2468 wrote to memory of 560 2468 todymdgvwmgb.exe conhost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe PID 2468 wrote to memory of 2044 2468 todymdgvwmgb.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "PHSWJLZY"2⤵
- Launches sc.exe
PID:2696
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "PHSWJLZY" binpath= "C:\ProgramData\jndraacsywhc\todymdgvwmgb.exe" start= "auto"2⤵
- Launches sc.exe
PID:2804
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2596
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "PHSWJLZY"2⤵
- Launches sc.exe
PID:2540
-
-
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exeC:\ProgramData\jndraacsywhc\todymdgvwmgb.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:560 -
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exe"C:\ProgramData\jndraacsywhc\todymdgvwmgb.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD51ae428bee44939bbd1807ceefd1ec93b
SHA1c6504fee64d35a5a84c2ceae6da3e40a8c551f5e
SHA2560fa3e8f5380942f90baed165fccd8149bba2101738e25e11a1d12bdb62611ddb
SHA512c12e2f3d9902b1e25b5e01d94009eb75a7dfec688ea0c710e541ba35559e7672e1f917293b1df21262b1c2bae3a1cb382e640a29b78d492a713e1fb91058c6d4
-
Filesize
4.4MB
MD51a4ae323b8aecb2bc56d63959b531e95
SHA14764b18ccc003aba962b31a6090d8182bc3809b7
SHA256f6af191ceada7fd706b495c7fb3aed01d8fc14180a34e46aee6f8371cb3f67bf
SHA51242ed4b8f8c7351aaf8cf15ab427bccada101f5713e463136fe12af6bf8682996d01eb1d915d3ce31d3c427f3bf00d1c95da09a5cefade970ff9d89c828a70e97
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
5.2MB
MD5716b8af982a9afe2a4c703926947f9fa
SHA1baff503c4409fbdf2c00d7b8f815427a48b1c315
SHA2564e9748ee1c9381c262dfe58ce3618e8aa1d28e1761b987208cde79050683e0ad
SHA5126854183ce7da6410eccb0b8185887f7041a6b5ac6f2277e1c426e0bdde0810608fe5870dd866b38551fa839a8b885aa472924f234a9086bb5ca8cbd9efff206c
-
Filesize
3.3MB
MD5e1a40c90bb56cbe64e0f4e281e003849
SHA16f7270a6093fd74a248a66f0b95002cf780ca1b6
SHA2565afe08f260151c0c5e09435645dc8e4a4d36a8b0354024243dbc995cf1881285
SHA512246bfc25e9b89a7ca95f58aa082abeb99599218a6eb01e28a6ec6f304ec708d23060a0b3fa1f132329b6c26aa0aad0f64a3f5e5dfd75fa02873a98dfbd01d06e