Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
omega.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
omega.exe
Resource
win10v2004-20240426-en
General
-
Target
omega.exe
-
Size
7.9MB
-
MD5
d57bb0db39ff23571e15c96c1dcf8879
-
SHA1
2a5e724e9b299355074caff738dcaa90a39ed29d
-
SHA256
e5a3b411fdbd22fba9c70388f0d123a0630d8c8018c38bd8f5dabed92ce10643
-
SHA512
4c4cff9187896eb213624d86461ad04d198b8b67b801f6e259dd9612c0e5e1965fc3819aae2e85a85302d5ee5293a7506ea3bc486d1c47c20177c815a2f166b9
-
SSDEEP
98304:lrhSTW393YQDSve5RopIHrpogsDMxbmY/gcKIeBOQ2w0vSOXHiOoKr2oYDOtKysv:lTfDSW5pSgstMvS0HboKr2oYDO0gU
Malware Config
Signatures
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral2/memory/2564-53-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-55-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-57-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-54-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-56-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-64-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-62-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-65-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-63-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-60-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-73-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-74-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-76-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-77-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig behavioral2/memory/2564-78-0x0000000140000000-0x0000000140AB6000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion xibhhhbnkawc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion xibhhhbnkawc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion omega.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion omega.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion xibhhhbnkawc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion xibhhhbnkawc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion conhost.exe -
Executes dropped EXE 2 IoCs
pid Process 4392 xibhhhbnkawc.exe 5004 xibhhhbnkawc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4392 set thread context of 3752 4392 xibhhhbnkawc.exe 92 PID 4392 set thread context of 2564 4392 xibhhhbnkawc.exe 93 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4744 sc.exe 1464 sc.exe 1784 sc.exe 4412 sc.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1208 omega.exe 1208 omega.exe 1208 omega.exe 1208 omega.exe 4392 xibhhhbnkawc.exe 4392 xibhhhbnkawc.exe 3752 conhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 2564 conhost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4392 wrote to memory of 3752 4392 xibhhhbnkawc.exe 92 PID 4392 wrote to memory of 3752 4392 xibhhhbnkawc.exe 92 PID 4392 wrote to memory of 3752 4392 xibhhhbnkawc.exe 92 PID 4392 wrote to memory of 3752 4392 xibhhhbnkawc.exe 92 PID 4392 wrote to memory of 3752 4392 xibhhhbnkawc.exe 92 PID 4392 wrote to memory of 3752 4392 xibhhhbnkawc.exe 92 PID 4392 wrote to memory of 3752 4392 xibhhhbnkawc.exe 92 PID 4392 wrote to memory of 3752 4392 xibhhhbnkawc.exe 92 PID 4392 wrote to memory of 3752 4392 xibhhhbnkawc.exe 92 PID 4392 wrote to memory of 2564 4392 xibhhhbnkawc.exe 93 PID 4392 wrote to memory of 2564 4392 xibhhhbnkawc.exe 93 PID 4392 wrote to memory of 2564 4392 xibhhhbnkawc.exe 93 PID 4392 wrote to memory of 2564 4392 xibhhhbnkawc.exe 93 PID 4392 wrote to memory of 2564 4392 xibhhhbnkawc.exe 93 PID 4392 wrote to memory of 2564 4392 xibhhhbnkawc.exe 93 PID 4392 wrote to memory of 2564 4392 xibhhhbnkawc.exe 93 PID 4392 wrote to memory of 2564 4392 xibhhhbnkawc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\omega.exe"C:\Users\Admin\AppData\Local\Temp\omega.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "XAITRWNX"2⤵
- Launches sc.exe
PID:4412
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "XAITRWNX" binpath= "C:\ProgramData\fyabgnfhrqvg\xibhhhbnkawc.exe" start= "auto"2⤵
- Launches sc.exe
PID:4744
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:1464
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "XAITRWNX"2⤵
- Launches sc.exe
PID:1784
-
-
C:\ProgramData\fyabgnfhrqvg\xibhhhbnkawc.exeC:\ProgramData\fyabgnfhrqvg\xibhhhbnkawc.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752 -
C:\ProgramData\fyabgnfhrqvg\xibhhhbnkawc.exe"C:\ProgramData\fyabgnfhrqvg\xibhhhbnkawc.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:5004
-
-
-
C:\Windows\system32\conhost.execonhost.exe2⤵
- Checks BIOS information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD5d57bb0db39ff23571e15c96c1dcf8879
SHA12a5e724e9b299355074caff738dcaa90a39ed29d
SHA256e5a3b411fdbd22fba9c70388f0d123a0630d8c8018c38bd8f5dabed92ce10643
SHA5124c4cff9187896eb213624d86461ad04d198b8b67b801f6e259dd9612c0e5e1965fc3819aae2e85a85302d5ee5293a7506ea3bc486d1c47c20177c815a2f166b9
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d