General

  • Target

    Setup.exe

  • Size

    5.6MB

  • Sample

    240711-ptf99swfnr

  • MD5

    fe3aade85026dd848fdf2f63952ff734

  • SHA1

    09d5fd71d993050b588cc79544a6bf243d6f8ab4

  • SHA256

    8345803c6780d770d0ea3df50d6c06d6b1113e7316b3d93dbea7e54a9fdcd58c

  • SHA512

    db089fde7d6806fa929e0ec2c48bfcb84c7e47d01ddf45380d3681d988947222d938e0d15a9cb3d69975262fcc1508582f58b4cf22dd891cfaf3f45e6afc0bb8

  • SSDEEP

    98304:ld+0JWUJGRDGQ8kIsmAYrvllcL0QH3YRjdT3i14b60n70p7hr/Bazr3AT:lQRV2lkeBxV7E7hr/BUTA

Malware Config

Targets

    • Target

      Setup.exe

    • Size

      5.6MB

    • MD5

      fe3aade85026dd848fdf2f63952ff734

    • SHA1

      09d5fd71d993050b588cc79544a6bf243d6f8ab4

    • SHA256

      8345803c6780d770d0ea3df50d6c06d6b1113e7316b3d93dbea7e54a9fdcd58c

    • SHA512

      db089fde7d6806fa929e0ec2c48bfcb84c7e47d01ddf45380d3681d988947222d938e0d15a9cb3d69975262fcc1508582f58b4cf22dd891cfaf3f45e6afc0bb8

    • SSDEEP

      98304:ld+0JWUJGRDGQ8kIsmAYrvllcL0QH3YRjdT3i14b60n70p7hr/Bazr3AT:lQRV2lkeBxV7E7hr/BUTA

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks