Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240226-en
General
-
Target
tmp.exe
-
Size
10.4MB
-
MD5
dff762abefd2ac634f87aacd920c8bdc
-
SHA1
b8ea30c9d631fbb4a1f57c2873ca8aeb64c93643
-
SHA256
33136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c
-
SHA512
54db97efb4ffcec9bc4122a6e41029c3cd457b631ede685eb883d5884f5a7b90c465dc8ec2212e712af935481073a2b4eb5180431926f03febccb055d9585341
-
SSDEEP
196608:D2neZjvDa5N5o9LrIbQTsbHu7THe8FhG8ryPzB3SFyFYha:D3/AU9LrIdb+THVFg8uhSYFYha
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/1708-9-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1708-11-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1708-12-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1708-13-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1708-14-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1708-15-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1708-17-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/1708-18-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
todymdgvwmgb.exepid process 448 todymdgvwmgb.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 4384 sc.exe 1116 sc.exe 1324 sc.exe 4644 sc.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
tmp.exepid process 1424 tmp.exe 1424 tmp.exe 1424 tmp.exe 1424 tmp.exe 1424 tmp.exe 1424 tmp.exe 1424 tmp.exe 1424 tmp.exe 1424 tmp.exe 1424 tmp.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exesvchost.exedescription pid process Token: SeShutdownPrivilege 3296 powercfg.exe Token: SeCreatePagefilePrivilege 3296 powercfg.exe Token: SeShutdownPrivilege 4952 powercfg.exe Token: SeCreatePagefilePrivilege 4952 powercfg.exe Token: SeShutdownPrivilege 4636 powercfg.exe Token: SeCreatePagefilePrivilege 4636 powercfg.exe Token: SeShutdownPrivilege 4072 powercfg.exe Token: SeCreatePagefilePrivilege 4072 powercfg.exe Token: SeShutdownPrivilege 2716 powercfg.exe Token: SeCreatePagefilePrivilege 2716 powercfg.exe Token: SeShutdownPrivilege 1100 powercfg.exe Token: SeCreatePagefilePrivilege 1100 powercfg.exe Token: SeShutdownPrivilege 464 powercfg.exe Token: SeCreatePagefilePrivilege 464 powercfg.exe Token: SeShutdownPrivilege 4940 powercfg.exe Token: SeCreatePagefilePrivilege 4940 powercfg.exe Token: SeLockMemoryPrivilege 1708 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "PHSWJLZY"2⤵
- Launches sc.exe
PID:4384
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "PHSWJLZY" binpath= "C:\ProgramData\jndraacsywhc\todymdgvwmgb.exe" start= "auto"2⤵
- Launches sc.exe
PID:1116
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:1324
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "PHSWJLZY"2⤵
- Launches sc.exe
PID:4644
-
-
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exeC:\ProgramData\jndraacsywhc\todymdgvwmgb.exe1⤵
- Executes dropped EXE
PID:448 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3616
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5431bab206455c3cf87a2c3928814976d
SHA164693d34849ee3d4bb2318e6185efeb1ecd7e1d2
SHA256cfb6247a2823ac939262590d66f23f2c1427898f957be8633fa519aa31dc8388
SHA5129cd26a937b9b42b54e17065a63a3a7ac362837221e565bab28c298c3b3f1f8fb2c353dcdbc67da6f9f9d7aed48a1b774cf98a87e518bb7ab4979a6df60512904
-
Filesize
2.1MB
MD5f31835cbdbe4955e9e1e051c7e208892
SHA1bc9114530501396c61603c15db736a7a79027cfd
SHA2567ff3cf6830941c32d9881f9e6dfddad66ebe039ab7c31443aebeb3dea91ba1c3
SHA512bfd40d3dce56a51bb305d0f95c55d43f97dbe7c376f1fee6b494f7feb6f6fed940385f76d802e975f4008aa6fcdc331539b942bb40a3c19a3fdcf416ce296adc