Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe
Resource
win10v2004-20240226-en
General
-
Target
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe
-
Size
10.4MB
-
MD5
dff762abefd2ac634f87aacd920c8bdc
-
SHA1
b8ea30c9d631fbb4a1f57c2873ca8aeb64c93643
-
SHA256
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c
-
SHA512
54db97efb4ffcec9bc4122a6e41029c3cd457b631ede685eb883d5884f5a7b90c465dc8ec2212e712af935481073a2b4eb5180431926f03febccb055d9585341
-
SSDEEP
196608:D2neZjvDa5N5o9LrIbQTsbHu7THe8FhG8ryPzB3SFyFYha:D3/AU9LrIdb+THVFg8uhSYFYha
Malware Config
Signatures
-
XMRig Miner payload 16 IoCs
Processes:
resource yara_rule behavioral2/memory/4288-21-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-22-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-23-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-24-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-25-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-26-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-27-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-28-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-30-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-33-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-34-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-35-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-36-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-37-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-39-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/4288-40-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
todymdgvwmgb.exepid process 2096 todymdgvwmgb.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
todymdgvwmgb.exedescription pid process target process PID 2096 set thread context of 1432 2096 todymdgvwmgb.exe conhost.exe PID 2096 set thread context of 4288 2096 todymdgvwmgb.exe svchost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 3152 sc.exe 4648 sc.exe 3716 sc.exe 5052 sc.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exetodymdgvwmgb.exepid process 2836 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 2836 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 2836 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 2836 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 2836 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 2836 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 2836 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 2836 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 2836 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 2836 33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe 2096 todymdgvwmgb.exe 2096 todymdgvwmgb.exe 2096 todymdgvwmgb.exe 2096 todymdgvwmgb.exe 2096 todymdgvwmgb.exe 2096 todymdgvwmgb.exe 2096 todymdgvwmgb.exe 2096 todymdgvwmgb.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exesvchost.exedescription pid process Token: SeShutdownPrivilege 1260 powercfg.exe Token: SeCreatePagefilePrivilege 1260 powercfg.exe Token: SeShutdownPrivilege 780 powercfg.exe Token: SeCreatePagefilePrivilege 780 powercfg.exe Token: SeShutdownPrivilege 5104 powercfg.exe Token: SeCreatePagefilePrivilege 5104 powercfg.exe Token: SeShutdownPrivilege 2420 powercfg.exe Token: SeCreatePagefilePrivilege 2420 powercfg.exe Token: SeShutdownPrivilege 452 powercfg.exe Token: SeCreatePagefilePrivilege 452 powercfg.exe Token: SeShutdownPrivilege 3496 powercfg.exe Token: SeCreatePagefilePrivilege 3496 powercfg.exe Token: SeShutdownPrivilege 2976 powercfg.exe Token: SeCreatePagefilePrivilege 2976 powercfg.exe Token: SeShutdownPrivilege 3080 powercfg.exe Token: SeCreatePagefilePrivilege 3080 powercfg.exe Token: SeLockMemoryPrivilege 4288 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
todymdgvwmgb.exedescription pid process target process PID 2096 wrote to memory of 1432 2096 todymdgvwmgb.exe conhost.exe PID 2096 wrote to memory of 1432 2096 todymdgvwmgb.exe conhost.exe PID 2096 wrote to memory of 1432 2096 todymdgvwmgb.exe conhost.exe PID 2096 wrote to memory of 1432 2096 todymdgvwmgb.exe conhost.exe PID 2096 wrote to memory of 1432 2096 todymdgvwmgb.exe conhost.exe PID 2096 wrote to memory of 1432 2096 todymdgvwmgb.exe conhost.exe PID 2096 wrote to memory of 1432 2096 todymdgvwmgb.exe conhost.exe PID 2096 wrote to memory of 1432 2096 todymdgvwmgb.exe conhost.exe PID 2096 wrote to memory of 1432 2096 todymdgvwmgb.exe conhost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe PID 2096 wrote to memory of 4288 2096 todymdgvwmgb.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe"C:\Users\Admin\AppData\Local\Temp\33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "PHSWJLZY"2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "PHSWJLZY" binpath= "C:\ProgramData\jndraacsywhc\todymdgvwmgb.exe" start= "auto"2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "PHSWJLZY"2⤵
- Launches sc.exe
-
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exeC:\ProgramData\jndraacsywhc\todymdgvwmgb.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exeFilesize
4.7MB
MD522155c49baf7b6aa795b0c4edff82145
SHA1fc5438a78bb68f3b8d816361c829620cc9590e7c
SHA25648edccec43cd0a71835fce04d6cae1dfe253f0469ec1f615abb95d9329e6d658
SHA512a43614d3c6c56f4159205fa8014b83da5ce785b07d8da4a9755077d6cba0b962ea1bab37f1e91a6d7fdc479f31853e39b1fafc13f7881c3bb07afde3df6bf8d2
-
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exeFilesize
5.5MB
MD56341fb707d7f9fab0d7e35ffbab13e4e
SHA18ad6f52f94082dca30731eff2dec75d1e3808d26
SHA25613b4bb3ff2b4b86238085e287f4d3dfe5e2ceb9e7ba8857f560f6d02980b5994
SHA512a8ab900e4a68b8008e0d15f6020899fcc0bf9779a40d83c388300ab1ee12c50bed6b064860a73d68dbdf5e59f04c8b9ed427a6eef44c01492221f4cb8a49aaa8
-
memory/1432-12-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1432-19-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1432-16-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1432-15-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1432-13-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1432-14-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/2096-9-0x0000000140000000-0x000000014199B000-memory.dmpFilesize
25.6MB
-
memory/2096-10-0x0000000140000000-0x000000014199B000-memory.dmpFilesize
25.6MB
-
memory/2096-32-0x0000000140000000-0x000000014199B000-memory.dmpFilesize
25.6MB
-
memory/2836-0-0x00007FFA6BC30000-0x00007FFA6BC32000-memory.dmpFilesize
8KB
-
memory/2836-5-0x0000000140000000-0x000000014199B000-memory.dmpFilesize
25.6MB
-
memory/2836-2-0x0000000140000000-0x000000014199B000-memory.dmpFilesize
25.6MB
-
memory/2836-1-0x0000000140000000-0x000000014199B000-memory.dmpFilesize
25.6MB
-
memory/4288-24-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-33-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-23-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-21-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-25-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-26-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-27-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-28-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-30-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-31-0x000002547FB90000-0x000002547FBB0000-memory.dmpFilesize
128KB
-
memory/4288-20-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-22-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-34-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-35-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-36-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-37-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-38-0x00000254002A0000-0x00000254002C0000-memory.dmpFilesize
128KB
-
memory/4288-39-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-40-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/4288-41-0x00000254002C0000-0x00000254002E0000-memory.dmpFilesize
128KB
-
memory/4288-42-0x00000254002C0000-0x00000254002E0000-memory.dmpFilesize
128KB