Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 01:17

General

  • Target

    2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe

  • Size

    19.8MB

  • MD5

    74595855031cc4eb18b48346f876cd2e

  • SHA1

    24bf72be8f93f2da8defe6c47004ecde786458ef

  • SHA256

    2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a

  • SHA512

    33227d3e36a95fd4b9fcee533997bab9080a735c52417a10114a01d81c15eebcccca1cb99c6cfaf70691fc5149a41f8cffd4ee5fd54e0a593aaeb1ca6438b240

  • SSDEEP

    393216:xao4ZbKh+7uRQSn44pfrovhexQ0s0kl1X5+twDyClkzmv7PXVTpa:xaoAW+qpf6hKQJ+tcH6zmv7Xa

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • XMRig Miner payload 2 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects executables packed with Themida 46 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Themida packer 46 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • AutoIT Executable 41 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe
    "C:\Users\Admin\AppData\Local\Temp\2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ipconfig /flushdns
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\system32\ipconfig.exe
        ipconfig /flushdns
        3⤵
        • Gathers network information
        PID:2772
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c gpupdate /force
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Windows\system32\gpupdate.exe
        gpupdate /force
        3⤵
          PID:2444
      • C:\ProgramData\Setup\Packs.exe
        C:\ProgramData\Setup\Packs.exe -ppidar
        2⤵
        • Executes dropped EXE
        PID:772
      • C:\ProgramData\WindowsTask\audiodg.exe
        C:\ProgramData\WindowsTask\audiodg.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:2952
      • C:\ProgramData\WindowsTask\MicrosoftHost.exe
        C:\ProgramData\WindowsTask\MicrosoftHost.exe -o stratum+tcp://185.139.69.167:3333 -u CPU --donate-level=1 -k --cpu-priority=0 -t4
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2608

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    Defense Evasion

    Hide Artifacts

    1
    T1564

    Hidden Files and Directories

    1
    T1564.001

    Modify Registry

    1
    T1112

    Virtualization/Sandbox Evasion

    1
    T1497

    Discovery

    Query Registry

    2
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    3
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Setup\Packs.exe
      Filesize

      7.8MB

      MD5

      2c478377002d8f8c188252f338e10d17

      SHA1

      71c3b3154ae57c9e692c32653ab8859c23680b30

      SHA256

      bda32a05036ce8fabd53f41509c114c5bf2c9d8343fb7725b6b21903ca44a89c

      SHA512

      fd183050382e834dadec658d0f9673607049a605c5c7dafe997d74b3921dafca0b677b8cfba9733cfd1d9c80581133281778f6be46f7080c5d743ea2c6f99dde

    • C:\ProgramData\WindowsTask\MicrosoftHost.exe
      Filesize

      5.2MB

      MD5

      1ee4321c311d7e58208c61630fa3f278

      SHA1

      67ef36cf785ec0d4602eb35a98c23420beba2e2a

      SHA256

      463ce847b6f7b32d1f4f49dfaaa2ce4a1061b6dfca1fb6a1bf39f7f40117266d

      SHA512

      f0bbf219926d7316bce936e4c362f2b5195420b7ee14538dd61d8a362921351cdde80705fcff8249773284a10067149f5a60291fa965aaaaca65fc535a5a8ffd

    • C:\ProgramData\WindowsTask\WinRing0x64.sys
      Filesize

      14KB

      MD5

      0c0195c48b6b8582fa6f6373032118da

      SHA1

      d25340ae8e92a6d29f599fef426a2bc1b5217299

      SHA256

      11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5

      SHA512

      ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d

    • C:\ProgramData\WindowsTask\audiodg.exe
      Filesize

      5.7MB

      MD5

      5bda5e3354916c14aeef5e9c1589ea99

      SHA1

      a9bf3059461f569a290fbbfe0e59d9629f5749ec

      SHA256

      7fa2c88d0732f4f432320d0b8cdc8a024b5efcae99da74dcd06dc91089ffd101

      SHA512

      5a9b55bf1124002e67468f133f47008426f19f1acb7de76eb001fc94ff4e9170142fa8b394bc8cee8d805a8484724135ef0251f029bd1304954b0aa2a2f8a987

    • memory/1548-62-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-122-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-7-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-6-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-8-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-9-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-15-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-4-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-38-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-36-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-3-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-2-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-50-0x00000000073F0000-0x00000000082BB000-memory.dmp
      Filesize

      14.8MB

    • memory/1548-134-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-1-0x00000000779E0000-0x00000000779E2000-memory.dmp
      Filesize

      8KB

    • memory/1548-128-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-0-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-117-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-112-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-106-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-101-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-89-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-85-0x00000000073F0000-0x00000000082BB000-memory.dmp
      Filesize

      14.8MB

    • memory/1548-5-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-95-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-75-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/1548-83-0x000000013FFD0000-0x0000000141C7F000-memory.dmp
      Filesize

      28.7MB

    • memory/2608-61-0x0000000000110000-0x0000000000130000-memory.dmp
      Filesize

      128KB

    • memory/2952-58-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-132-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-56-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-93-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-70-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-99-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-54-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-53-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-110-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-88-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-105-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-115-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-59-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-121-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-60-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-125-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-57-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-81-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-51-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB

    • memory/2952-138-0x000000013F500000-0x00000001403CB000-memory.dmp
      Filesize

      14.8MB