Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240226-en
General
-
Target
tmp.exe
-
Size
10.4MB
-
MD5
dff762abefd2ac634f87aacd920c8bdc
-
SHA1
b8ea30c9d631fbb4a1f57c2873ca8aeb64c93643
-
SHA256
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c
-
SHA512
54db97efb4ffcec9bc4122a6e41029c3cd457b631ede685eb883d5884f5a7b90c465dc8ec2212e712af935481073a2b4eb5180431926f03febccb055d9585341
-
SSDEEP
196608:D2neZjvDa5N5o9LrIbQTsbHu7THe8FhG8ryPzB3SFyFYha:D3/AU9LrIdb+THVFg8uhSYFYha
Malware Config
Signatures
-
XMRig Miner payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/1740-35-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-36-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-37-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-38-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-39-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-40-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-41-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-42-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-44-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-48-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-49-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-51-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-50-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-52-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-53-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1740-54-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 2 IoCs
Processes:
todymdgvwmgb.exepid process 480 804 todymdgvwmgb.exe -
Loads dropped DLL 1 IoCs
Processes:
pid process 480 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
todymdgvwmgb.exedescription pid process target process PID 804 set thread context of 2492 804 todymdgvwmgb.exe conhost.exe PID 804 set thread context of 1740 804 todymdgvwmgb.exe svchost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2720 sc.exe 2572 sc.exe 2088 sc.exe 2632 sc.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
tmp.exetodymdgvwmgb.exepid process 1964 tmp.exe 1964 tmp.exe 1964 tmp.exe 1964 tmp.exe 1964 tmp.exe 1964 tmp.exe 1964 tmp.exe 1964 tmp.exe 1964 tmp.exe 804 todymdgvwmgb.exe 804 todymdgvwmgb.exe 804 todymdgvwmgb.exe 804 todymdgvwmgb.exe 804 todymdgvwmgb.exe 804 todymdgvwmgb.exe 804 todymdgvwmgb.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exesvchost.exedescription pid process Token: SeShutdownPrivilege 1344 powercfg.exe Token: SeShutdownPrivilege 2836 powercfg.exe Token: SeShutdownPrivilege 2984 powercfg.exe Token: SeShutdownPrivilege 2540 powercfg.exe Token: SeShutdownPrivilege 2512 powercfg.exe Token: SeShutdownPrivilege 2444 powercfg.exe Token: SeShutdownPrivilege 2464 powercfg.exe Token: SeShutdownPrivilege 2480 powercfg.exe Token: SeLockMemoryPrivilege 1740 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
todymdgvwmgb.exedescription pid process target process PID 804 wrote to memory of 2492 804 todymdgvwmgb.exe conhost.exe PID 804 wrote to memory of 2492 804 todymdgvwmgb.exe conhost.exe PID 804 wrote to memory of 2492 804 todymdgvwmgb.exe conhost.exe PID 804 wrote to memory of 2492 804 todymdgvwmgb.exe conhost.exe PID 804 wrote to memory of 2492 804 todymdgvwmgb.exe conhost.exe PID 804 wrote to memory of 2492 804 todymdgvwmgb.exe conhost.exe PID 804 wrote to memory of 2492 804 todymdgvwmgb.exe conhost.exe PID 804 wrote to memory of 2492 804 todymdgvwmgb.exe conhost.exe PID 804 wrote to memory of 2492 804 todymdgvwmgb.exe conhost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe PID 804 wrote to memory of 1740 804 todymdgvwmgb.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "PHSWJLZY"2⤵
- Launches sc.exe
PID:2720
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "PHSWJLZY" binpath= "C:\ProgramData\jndraacsywhc\todymdgvwmgb.exe" start= "auto"2⤵
- Launches sc.exe
PID:2572
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2632
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "PHSWJLZY"2⤵
- Launches sc.exe
PID:2088
-
-
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exeC:\ProgramData\jndraacsywhc\todymdgvwmgb.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2492
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51e64937c425097f7e47e327e7f713c3b
SHA1fb3bb6564321ef74688d71be1037b45d45f75851
SHA2568835ceecae6f9204c6c3f09681a3dd3233c3e27e60c0bd73d73d6649f27837da
SHA512acf38a9aefcffff014d983426e074197fc11366c86f6f8ffbdc1995ade1fd90ed390caf3998454b7d0d0faf4f98d87559637e9d3a0a86e032b77e32089e4c98b
-
Filesize
4.6MB
MD541bd52f4e19efbf42c3f95c6389bb0b4
SHA13b6ec9d85dce2b25672dffa983b3de305ef95228
SHA2565c5aa25d11baf57b575a54af880a449a7f1a3ed233a52c5482cf327e1b258e17
SHA512283eb29dc8b484b6bf8d2d9a0ea97b808bbfe41aefdba8740a2fe3987e552dd393db34756b78084b6884ba2c3791dff3e232d4a5be3980b220569890c160ae93
-
Filesize
4.1MB
MD59dfd3f8fd994d860c48749a653f24696
SHA1ee9cfedb9320ba78f7fc631597ea1496e840c980
SHA2563d67cda6234ec5476c026d68ca24724cf7756ad542865e30c999dc38444220b0
SHA512a64aa91f4583bc69aa95d81dcbcd60a9819e34582f4b511320ccc1eab5ba91fd4559a692f8fd60c8e0a5bf3c0e1fb35c252b2801ca8a6de22e4112ad90c88d8f
-
Filesize
3.1MB
MD55d1e7be9f08b9817f50bc34f6009ebfd
SHA19647ba832fdcaeffe2d347cb3eb8c595a2836ddf
SHA25646e2e99cc90f9e97ca32f59bf5c1ca523d11e85f1f866e8bb8d1751bdc42c357
SHA512e41366f6e002a855c8ae83606baa9389cb040de93325a400294e484594f600c7c8463f3246c6ad24ee0c75ece1e7647ab5fa3665be966bd7febf9236febd014d