Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
be62af2560409506f5748556a60d25fbc0b42adb0b56fe08bf6039b61cb6c58d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be62af2560409506f5748556a60d25fbc0b42adb0b56fe08bf6039b61cb6c58d.exe
Resource
win10v2004-20240226-en
General
-
Target
be62af2560409506f5748556a60d25fbc0b42adb0b56fe08bf6039b61cb6c58d.exe
-
Size
2.5MB
-
MD5
4c38070e0764c127692cff709fbfa99e
-
SHA1
36c85d6658eb285b31d0f20fa60e1e935711cc9f
-
SHA256
be62af2560409506f5748556a60d25fbc0b42adb0b56fe08bf6039b61cb6c58d
-
SHA512
b55471879efe435a46297bcd6d21006a03896bba7bbdf6fa39ed694e6aae3651a94e473fef60d50b2964effc05bbb87bc1082ca85872842853dccb2a0df93d7e
-
SSDEEP
49152:S0+srvwWgzGqpGODg5QQUgbtJHBfHTe3b2UmZZKfCAb:S02GeDgOQUgb9/T67CA
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/4876-16-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4876-17-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4876-19-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4876-20-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4876-21-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4876-22-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4876-23-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4876-25-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4876-26-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3308 hhfnvbwmqfna.exe -
resource yara_rule behavioral2/memory/4876-11-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-12-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-13-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-14-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-15-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-19-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-20-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-21-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-22-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-23-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-25-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4876-26-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3308 set thread context of 1872 3308 hhfnvbwmqfna.exe 107 PID 3308 set thread context of 4876 3308 hhfnvbwmqfna.exe 108 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2880 sc.exe 3928 sc.exe 1328 sc.exe 1692 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2668 be62af2560409506f5748556a60d25fbc0b42adb0b56fe08bf6039b61cb6c58d.exe 2668 be62af2560409506f5748556a60d25fbc0b42adb0b56fe08bf6039b61cb6c58d.exe 2668 be62af2560409506f5748556a60d25fbc0b42adb0b56fe08bf6039b61cb6c58d.exe 2668 be62af2560409506f5748556a60d25fbc0b42adb0b56fe08bf6039b61cb6c58d.exe 3308 hhfnvbwmqfna.exe 3308 hhfnvbwmqfna.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe 4876 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 4876 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3308 wrote to memory of 1872 3308 hhfnvbwmqfna.exe 107 PID 3308 wrote to memory of 1872 3308 hhfnvbwmqfna.exe 107 PID 3308 wrote to memory of 1872 3308 hhfnvbwmqfna.exe 107 PID 3308 wrote to memory of 1872 3308 hhfnvbwmqfna.exe 107 PID 3308 wrote to memory of 1872 3308 hhfnvbwmqfna.exe 107 PID 3308 wrote to memory of 1872 3308 hhfnvbwmqfna.exe 107 PID 3308 wrote to memory of 1872 3308 hhfnvbwmqfna.exe 107 PID 3308 wrote to memory of 1872 3308 hhfnvbwmqfna.exe 107 PID 3308 wrote to memory of 1872 3308 hhfnvbwmqfna.exe 107 PID 3308 wrote to memory of 4876 3308 hhfnvbwmqfna.exe 108 PID 3308 wrote to memory of 4876 3308 hhfnvbwmqfna.exe 108 PID 3308 wrote to memory of 4876 3308 hhfnvbwmqfna.exe 108 PID 3308 wrote to memory of 4876 3308 hhfnvbwmqfna.exe 108 PID 3308 wrote to memory of 4876 3308 hhfnvbwmqfna.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\be62af2560409506f5748556a60d25fbc0b42adb0b56fe08bf6039b61cb6c58d.exe"C:\Users\Admin\AppData\Local\Temp\be62af2560409506f5748556a60d25fbc0b42adb0b56fe08bf6039b61cb6c58d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "HKQILALP"2⤵
- Launches sc.exe
PID:2880
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "HKQILALP" binpath= "C:\ProgramData\vrlxsdysequq\hhfnvbwmqfna.exe" start= "auto"2⤵
- Launches sc.exe
PID:3928
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:1328
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "HKQILALP"2⤵
- Launches sc.exe
PID:1692
-
-
C:\ProgramData\vrlxsdysequq\hhfnvbwmqfna.exeC:\ProgramData\vrlxsdysequq\hhfnvbwmqfna.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1872
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD54c38070e0764c127692cff709fbfa99e
SHA136c85d6658eb285b31d0f20fa60e1e935711cc9f
SHA256be62af2560409506f5748556a60d25fbc0b42adb0b56fe08bf6039b61cb6c58d
SHA512b55471879efe435a46297bcd6d21006a03896bba7bbdf6fa39ed694e6aae3651a94e473fef60d50b2964effc05bbb87bc1082ca85872842853dccb2a0df93d7e