Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240226-en
General
-
Target
tmp.exe
-
Size
10.4MB
-
MD5
dff762abefd2ac634f87aacd920c8bdc
-
SHA1
b8ea30c9d631fbb4a1f57c2873ca8aeb64c93643
-
SHA256
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c
-
SHA512
54db97efb4ffcec9bc4122a6e41029c3cd457b631ede685eb883d5884f5a7b90c465dc8ec2212e712af935481073a2b4eb5180431926f03febccb055d9585341
-
SSDEEP
196608:D2neZjvDa5N5o9LrIbQTsbHu7THe8FhG8ryPzB3SFyFYha:D3/AU9LrIdb+THVFg8uhSYFYha
Malware Config
Signatures
-
XMRig Miner payload 16 IoCs
Processes:
resource yara_rule behavioral2/memory/2284-21-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-22-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-23-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-24-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-25-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-26-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-27-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-28-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-30-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-33-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-34-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-35-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-36-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-37-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-39-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2284-40-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
todymdgvwmgb.exepid process 400 todymdgvwmgb.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
todymdgvwmgb.exedescription pid process target process PID 400 set thread context of 4840 400 todymdgvwmgb.exe conhost.exe PID 400 set thread context of 2284 400 todymdgvwmgb.exe svchost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 1988 sc.exe 3316 sc.exe 3488 sc.exe 4072 sc.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
tmp.exetodymdgvwmgb.exepid process 2312 tmp.exe 2312 tmp.exe 2312 tmp.exe 2312 tmp.exe 2312 tmp.exe 2312 tmp.exe 2312 tmp.exe 2312 tmp.exe 2312 tmp.exe 2312 tmp.exe 400 todymdgvwmgb.exe 400 todymdgvwmgb.exe 400 todymdgvwmgb.exe 400 todymdgvwmgb.exe 400 todymdgvwmgb.exe 400 todymdgvwmgb.exe 400 todymdgvwmgb.exe 400 todymdgvwmgb.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 672 -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exesvchost.exedescription pid process Token: SeShutdownPrivilege 1960 powercfg.exe Token: SeCreatePagefilePrivilege 1960 powercfg.exe Token: SeShutdownPrivilege 4252 powercfg.exe Token: SeCreatePagefilePrivilege 4252 powercfg.exe Token: SeShutdownPrivilege 3916 powercfg.exe Token: SeCreatePagefilePrivilege 3916 powercfg.exe Token: SeShutdownPrivilege 1140 powercfg.exe Token: SeCreatePagefilePrivilege 1140 powercfg.exe Token: SeShutdownPrivilege 1508 powercfg.exe Token: SeCreatePagefilePrivilege 1508 powercfg.exe Token: SeShutdownPrivilege 2332 powercfg.exe Token: SeCreatePagefilePrivilege 2332 powercfg.exe Token: SeShutdownPrivilege 2592 powercfg.exe Token: SeCreatePagefilePrivilege 2592 powercfg.exe Token: SeShutdownPrivilege 3676 powercfg.exe Token: SeCreatePagefilePrivilege 3676 powercfg.exe Token: SeLockMemoryPrivilege 2284 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
todymdgvwmgb.exedescription pid process target process PID 400 wrote to memory of 4840 400 todymdgvwmgb.exe conhost.exe PID 400 wrote to memory of 4840 400 todymdgvwmgb.exe conhost.exe PID 400 wrote to memory of 4840 400 todymdgvwmgb.exe conhost.exe PID 400 wrote to memory of 4840 400 todymdgvwmgb.exe conhost.exe PID 400 wrote to memory of 4840 400 todymdgvwmgb.exe conhost.exe PID 400 wrote to memory of 4840 400 todymdgvwmgb.exe conhost.exe PID 400 wrote to memory of 4840 400 todymdgvwmgb.exe conhost.exe PID 400 wrote to memory of 4840 400 todymdgvwmgb.exe conhost.exe PID 400 wrote to memory of 4840 400 todymdgvwmgb.exe conhost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe PID 400 wrote to memory of 2284 400 todymdgvwmgb.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "PHSWJLZY"2⤵
- Launches sc.exe
PID:1988
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "PHSWJLZY" binpath= "C:\ProgramData\jndraacsywhc\todymdgvwmgb.exe" start= "auto"2⤵
- Launches sc.exe
PID:3316
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:3488
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "PHSWJLZY"2⤵
- Launches sc.exe
PID:4072
-
-
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exeC:\ProgramData\jndraacsywhc\todymdgvwmgb.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:4840
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5a50e350fc84f534ac4175873fd4ca11b
SHA1a678ddc42785e7723a2e5d53e917084dfa2f4218
SHA256369bed6f50d4c37b984dcdb3fcae8a37ce7196c649f038bd4a5fbc3d4cba8a7b
SHA512c1d8e73deb5665c76803efc35bc1f031f9ca04395b37c2db59c8905c9f517fbae6b77d68f4b1b8c7b63fa475c581614aabd08f79c4ad05cae8c289696813080c
-
Filesize
2.9MB
MD5915ef63254518769ccb67b7263364bd6
SHA10ccf97f08caa0b6bef22165f687c34d8c0527f98
SHA25610a8c1a6f80be08302d2b4327905144ff642175bce0915e82163c2836ff38ead
SHA512bf0a6e9f9f39b49d15e7436a33c9901755f8e7b0fc25432f943aa2c12ef7c143e1164bd2b0797554fa123b2aaf8ed3038405c9e6e44126ab0cd319e63d65698b