General
-
Target
https://drive.google.com/file/d/1Fos5FXWRKZbKUUYlQScBJFl7YLdGM4Np/view
-
Sample
240728-gqhd6a1gkq
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1Fos5FXWRKZbKUUYlQScBJFl7YLdGM4Np/view
Resource
win10v2004-20240709-en
Malware Config
Extracted
https://drive.usercontent.google.com/u/0/uc?id=1cOfdrYTcndJEY8uHrMnDtqUbkax07UMo&export=download
Extracted
phemedrone
https://api.telegram.org/bot7112551293:AAGZhRTgYJ4a8RYnU6UgUDOchJ72jMEo2t0/sendDocument
Targets
-
-
Target
https://drive.google.com/file/d/1Fos5FXWRKZbKUUYlQScBJFl7YLdGM4Np/view
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Creates new service(s)
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2