Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
962e9a7e391ed22b6567bc43ea2e2e9e8e8750601562a8356ffcb15c649a3ca0.exe
Resource
win7-20240705-en
General
-
Target
962e9a7e391ed22b6567bc43ea2e2e9e8e8750601562a8356ffcb15c649a3ca0.exe
-
Size
2.5MB
-
MD5
00a69916c649b8f347552f045d9529ef
-
SHA1
834062535c07857f99732e009358373a9321036a
-
SHA256
962e9a7e391ed22b6567bc43ea2e2e9e8e8750601562a8356ffcb15c649a3ca0
-
SHA512
423bc39fcdeeb56ed1449191bcc96607cbd43652ec2589cb810055d48db4769d8789001383b9db95beb36744b38057537e0a8bcff999874dd69c4b18c21b9172
-
SSDEEP
49152:MBeicQuxzs62GFUQsRALUKbtr4y8X2GcIqHwE2:MBeXxYAcAL5r4y8XqwE
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/2596-19-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2596-25-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2596-18-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2596-24-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2596-23-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2596-22-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2596-21-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2596-26-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2596-27-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 476 Process not Found 2780 system_services.exe -
Loads dropped DLL 1 IoCs
pid Process 476 Process not Found -
resource yara_rule behavioral1/memory/2596-11-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-19-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-25-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-18-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-24-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-23-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-22-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-15-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-21-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-14-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-26-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2596-27-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2780 set thread context of 2928 2780 system_services.exe 40 PID 2780 set thread context of 2596 2780 system_services.exe 41 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2112 sc.exe 2968 sc.exe 2792 sc.exe 2708 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1544 962e9a7e391ed22b6567bc43ea2e2e9e8e8750601562a8356ffcb15c649a3ca0.exe 1544 962e9a7e391ed22b6567bc43ea2e2e9e8e8750601562a8356ffcb15c649a3ca0.exe 1544 962e9a7e391ed22b6567bc43ea2e2e9e8e8750601562a8356ffcb15c649a3ca0.exe 1544 962e9a7e391ed22b6567bc43ea2e2e9e8e8750601562a8356ffcb15c649a3ca0.exe 2780 system_services.exe 2780 system_services.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe 2596 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 2596 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2928 2780 system_services.exe 40 PID 2780 wrote to memory of 2928 2780 system_services.exe 40 PID 2780 wrote to memory of 2928 2780 system_services.exe 40 PID 2780 wrote to memory of 2928 2780 system_services.exe 40 PID 2780 wrote to memory of 2928 2780 system_services.exe 40 PID 2780 wrote to memory of 2928 2780 system_services.exe 40 PID 2780 wrote to memory of 2928 2780 system_services.exe 40 PID 2780 wrote to memory of 2928 2780 system_services.exe 40 PID 2780 wrote to memory of 2928 2780 system_services.exe 40 PID 2780 wrote to memory of 2596 2780 system_services.exe 41 PID 2780 wrote to memory of 2596 2780 system_services.exe 41 PID 2780 wrote to memory of 2596 2780 system_services.exe 41 PID 2780 wrote to memory of 2596 2780 system_services.exe 41 PID 2780 wrote to memory of 2596 2780 system_services.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\962e9a7e391ed22b6567bc43ea2e2e9e8e8750601562a8356ffcb15c649a3ca0.exe"C:\Users\Admin\AppData\Local\Temp\962e9a7e391ed22b6567bc43ea2e2e9e8e8750601562a8356ffcb15c649a3ca0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Windows.Services"2⤵
- Launches sc.exe
PID:2792
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Windows.Services" binpath= "C:\ProgramData\system_services.exe" start= "auto"2⤵
- Launches sc.exe
PID:2708
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2112
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Windows.Services"2⤵
- Launches sc.exe
PID:2968
-
-
C:\ProgramData\system_services.exeC:\ProgramData\system_services.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2928
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD500a69916c649b8f347552f045d9529ef
SHA1834062535c07857f99732e009358373a9321036a
SHA256962e9a7e391ed22b6567bc43ea2e2e9e8e8750601562a8356ffcb15c649a3ca0
SHA512423bc39fcdeeb56ed1449191bcc96607cbd43652ec2589cb810055d48db4769d8789001383b9db95beb36744b38057537e0a8bcff999874dd69c4b18c21b9172