Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240226-en
General
-
Target
tmp.exe
-
Size
10.7MB
-
MD5
b091c4848287be6601d720997394d453
-
SHA1
9180e34175e1f4644d5fa63227d665b2be15c75b
-
SHA256
d0b06ca6ece3fef6671fa8acd3d560a9400891abcd10f5cedcfe7bd1e6050dfe
-
SHA512
a3b3663fd343389aee2cbf76f426401d436992b2b56cea3b60e9c2e385510fa874fa45b2ac75703074f0303934c4223eaee1983851374a2e753fd0302042cc5a
-
SSDEEP
196608:oPnV1Bk/fRaGxUCBIORz5Z2YoZX0tMmp6tgq1D//XxdgPxwdT:oPKfR/UCBF+dZX0tMft/vxdgpG
Malware Config
Signatures
-
XMRig Miner payload 16 IoCs
resource yara_rule behavioral1/memory/2536-36-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-37-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-38-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-39-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-40-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-41-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-42-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-43-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-46-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-50-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-51-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-52-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-53-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-54-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-69-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2536-70-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 3 IoCs
pid Process 464 Process not Found 2456 dckuybanmlgp.exe 2676 dckuybanmlgp.exe -
Loads dropped DLL 1 IoCs
pid Process 464 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2456 set thread context of 2804 2456 dckuybanmlgp.exe 50 PID 2456 set thread context of 2536 2456 dckuybanmlgp.exe 54 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2600 sc.exe 2556 sc.exe 2080 sc.exe 2656 sc.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2748 tmp.exe 2748 tmp.exe 2748 tmp.exe 2748 tmp.exe 2748 tmp.exe 2748 tmp.exe 2748 tmp.exe 2748 tmp.exe 2748 tmp.exe 2456 dckuybanmlgp.exe 2456 dckuybanmlgp.exe 2456 dckuybanmlgp.exe 2456 dckuybanmlgp.exe 2456 dckuybanmlgp.exe 2456 dckuybanmlgp.exe 2456 dckuybanmlgp.exe 2804 conhost.exe 2676 dckuybanmlgp.exe 2676 dckuybanmlgp.exe 2676 dckuybanmlgp.exe 2676 dckuybanmlgp.exe 2676 dckuybanmlgp.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeShutdownPrivilege 2584 powercfg.exe Token: SeShutdownPrivilege 2876 powercfg.exe Token: SeShutdownPrivilege 2416 powercfg.exe Token: SeShutdownPrivilege 1616 powercfg.exe Token: SeShutdownPrivilege 2780 powercfg.exe Token: SeShutdownPrivilege 2956 powercfg.exe Token: SeShutdownPrivilege 2344 powercfg.exe Token: SeShutdownPrivilege 2784 powercfg.exe Token: SeLockMemoryPrivilege 2536 svchost.exe Token: SeShutdownPrivilege 2776 powercfg.exe Token: SeShutdownPrivilege 1816 powercfg.exe Token: SeShutdownPrivilege 920 powercfg.exe Token: SeShutdownPrivilege 840 powercfg.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2804 2456 dckuybanmlgp.exe 50 PID 2456 wrote to memory of 2804 2456 dckuybanmlgp.exe 50 PID 2456 wrote to memory of 2804 2456 dckuybanmlgp.exe 50 PID 2456 wrote to memory of 2804 2456 dckuybanmlgp.exe 50 PID 2456 wrote to memory of 2804 2456 dckuybanmlgp.exe 50 PID 2456 wrote to memory of 2804 2456 dckuybanmlgp.exe 50 PID 2456 wrote to memory of 2804 2456 dckuybanmlgp.exe 50 PID 2456 wrote to memory of 2804 2456 dckuybanmlgp.exe 50 PID 2456 wrote to memory of 2804 2456 dckuybanmlgp.exe 50 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54 PID 2456 wrote to memory of 2536 2456 dckuybanmlgp.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "OBGPQMHF"2⤵
- Launches sc.exe
PID:2600
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "OBGPQMHF" binpath= "C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe" start= "auto"2⤵
- Launches sc.exe
PID:2556
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2080
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "OBGPQMHF"2⤵
- Launches sc.exe
PID:2656
-
-
C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exeC:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe"C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD55f11e17dab6d3d8590b793846fb490bf
SHA1286f4c3cb16af6b8c064aaec657c25c79cc98510
SHA25671d6ce626de09f7118ddab4a1d818abbe398840a2841bd1b3b1c0465df6f1f30
SHA51297e289d95ddb475b54cfbc5cd6b377c7b408be83c82e214e71efead4ae00db0777e30dbfc45ade2caab3c08d55435b3b6a6ae8ed1953ff64d273e5737b1e10a5
-
Filesize
10.7MB
MD5b091c4848287be6601d720997394d453
SHA19180e34175e1f4644d5fa63227d665b2be15c75b
SHA256d0b06ca6ece3fef6671fa8acd3d560a9400891abcd10f5cedcfe7bd1e6050dfe
SHA512a3b3663fd343389aee2cbf76f426401d436992b2b56cea3b60e9c2e385510fa874fa45b2ac75703074f0303934c4223eaee1983851374a2e753fd0302042cc5a
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
5.1MB
MD500868824e0478fdc3d9bac83d01c892b
SHA1ec3d9de65313e255c1edcace3fec73966e8692f6
SHA256baf7088dd6250b0e0e97482d51d41b56a07abaf170db380162de5cb5da71c60f
SHA51226a6e066a3c8b055153bbe10005dabc53b4fb581536afea80c778c3f14f260e0d305af80d51ab3d624a478526345eb2d78a649699c1b5cb131613f0223dab0b8
-
Filesize
4.6MB
MD50c577103fc8c0ea85b678c28c30588ca
SHA154c2bdedf905ce944fddf2769c1929bc10a0ce88
SHA25623c0498ea85ef4ec35bdc427a71a82021b87f9a3706e82482509b85e8cd14e64
SHA51241767c774d2b76d8afb4b634bfd7c252ef3a77b8797f9f63dd9b24a90ec71df388e0c671344c2bf70e341d0158432c10485a567b69533a27b8afc58a174a429a