Overview
overview
7Static
static
3ChiaSetup-2.4.3.exe
windows10-2004-x64
5$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3resources/...DME.js
windows10-2004-x64
3resources/...DME.js
windows10-2004-x64
3resources/...DME.js
windows10-2004-x64
3resources/...DME.js
windows10-2004-x64
3resources/...DME.js
windows10-2004-x64
3resources/...DME.js
windows10-2004-x64
3resources/...DME.js
windows10-2004-x64
3resources/...er.exe
windows10-2004-x64
1resources/...er.exe
windows10-2004-x64
1resources/...tp.exe
windows10-2004-x64
1resources/...in.exe
windows10-2004-x64
1resources/...er.exe
windows10-2004-x64
1resources/...de.exe
windows10-2004-x64
1resources/...er.exe
windows10-2004-x64
1resources/...er.exe
windows10-2004-x64
1resources/...er.exe
windows10-2004-x64
1resources/...rd.exe
windows10-2004-x64
1resources/...et.exe
windows10-2004-x64
1resources/...er.exe
windows10-2004-x64
1resources/elevate.exe
windows10-2004-x64
3vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$R0/Uninst...ia.exe
windows10-2004-x64
7Analysis
-
max time kernel
426s -
max time network
448s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 07:14
Behavioral task
behavioral1
Sample
ChiaSetup-2.4.3.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
resources/app.asar.unpacked/daemon/licenses/natural-compare/README.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
resources/app.asar.unpacked/daemon/licenses/react-use-timeout/README.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
resources/app.asar.unpacked/daemon/licenses/seedrandom/README.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
resources/app.asar.unpacked/daemon/licenses/socks-proxy-agent/README.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
resources/app.asar.unpacked/daemon/licenses/spdy-transport/README.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
resources/app.asar.unpacked/daemon/licenses/spdy/README.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
resources/app.asar.unpacked/daemon/licenses/toggle-selection/README.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
resources/app.asar.unpacked/daemon/start_crawler.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
resources/app.asar.unpacked/daemon/start_data_layer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
resources/app.asar.unpacked/daemon/start_data_layer_http.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
resources/app.asar.unpacked/daemon/start_data_layer_s3_plugin.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
resources/app.asar.unpacked/daemon/start_farmer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
resources/app.asar.unpacked/daemon/start_full_node.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral19
Sample
resources/app.asar.unpacked/daemon/start_harvester.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
resources/app.asar.unpacked/daemon/start_introducer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
resources/app.asar.unpacked/daemon/start_seeder.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
resources/app.asar.unpacked/daemon/start_timelord.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
resources/app.asar.unpacked/daemon/start_wallet.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
resources/app.asar.unpacked/daemon/timelord_launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
resources/elevate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
vk_swiftshader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
vulkan-1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
$R0/Uninstall Chia.exe
Resource
win10v2004-20240802-en
General
-
Target
resources/app.asar.unpacked/daemon/start_timelord.exe
-
Size
11.2MB
-
MD5
af012119bc6555e592f719de37ef6684
-
SHA1
f930d390bc49142b965696bfe8a0d32418a53365
-
SHA256
4cee0fccbae1709ce9e49e13bbcb5e4010e2cabadff5b300b4dd4318fc69d8b7
-
SHA512
b735d11ef448d69afa8bcdb9aec45d75d1128c44af216716aaf9df553c9842e6cb9051182c684f18daea2584e02f1c113747c371200637723e6f727c30c93bc4
-
SSDEEP
196608:uoL1+XomR8upvqAuwo6bVF2Ap6W7IArZXK38lciyNh7fFPkjkDkJY:tMXqu8iXbVF2c6W751638Q5ZIE+Y
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4116 start_timelord.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4116 wrote to memory of 2336 4116 start_timelord.exe 89 PID 4116 wrote to memory of 2336 4116 start_timelord.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\daemon\start_timelord.exe"C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\daemon\start_timelord.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"2⤵PID:2336
-