Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 19:19
Static task
static1
Behavioral task
behavioral1
Sample
943590af47af06d1bca1570bc116b25d.exe
Resource
win7-20240903-en
General
-
Target
943590af47af06d1bca1570bc116b25d.exe
-
Size
5.0MB
-
MD5
943590af47af06d1bca1570bc116b25d
-
SHA1
53eeb46310d02859984c6fa0787c5e6e3a274198
-
SHA256
d36de86e88ad124a4d4707dc60f136a6782f29af17f76f3714e37dec30f03201
-
SHA512
c3604262bcddc1bd092e29c17527d14f445ece56845b7a1596c735140a5590f947bc5796492f74fa1c673d3deeb69066de25a8ecd5f879ef6e15c44f0cf1f773
-
SSDEEP
98304:onw0oQREXMrEuBiq3gDkbAFcRWhgJsJpZqegs7eCCV2M8mrSrkFcQ7t0ZgpPpY:onw0BREX3kookFrKuAA7mV2M8CUKcW0F
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/2960-22-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2960-25-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2960-24-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2960-19-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2960-23-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2960-18-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2960-21-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2960-26-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 2 IoCs
Processes:
qsjxfirefkza.exepid process 476 2816 qsjxfirefkza.exe -
Loads dropped DLL 1 IoCs
Processes:
pid process 476 -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepid process 2072 powercfg.exe 2768 powercfg.exe 2812 powercfg.exe 2860 powercfg.exe 2836 powercfg.exe 2532 powercfg.exe 2576 powercfg.exe 2108 powercfg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
qsjxfirefkza.exedescription pid process target process PID 2816 set thread context of 2744 2816 qsjxfirefkza.exe conhost.exe PID 2816 set thread context of 2960 2816 qsjxfirefkza.exe explorer.exe -
Processes:
resource yara_rule behavioral1/memory/2960-15-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-17-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-22-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-25-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-24-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-19-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-23-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-18-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-16-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-21-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-14-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-13-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2960-26-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2564 sc.exe 2388 sc.exe 2500 sc.exe 264 sc.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
943590af47af06d1bca1570bc116b25d.exeqsjxfirefkza.exepid process 2012 943590af47af06d1bca1570bc116b25d.exe 2012 943590af47af06d1bca1570bc116b25d.exe 2012 943590af47af06d1bca1570bc116b25d.exe 2012 943590af47af06d1bca1570bc116b25d.exe 2012 943590af47af06d1bca1570bc116b25d.exe 2012 943590af47af06d1bca1570bc116b25d.exe 2012 943590af47af06d1bca1570bc116b25d.exe 2012 943590af47af06d1bca1570bc116b25d.exe 2816 qsjxfirefkza.exe 2816 qsjxfirefkza.exe 2816 qsjxfirefkza.exe 2816 qsjxfirefkza.exe 2816 qsjxfirefkza.exe 2816 qsjxfirefkza.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exeexplorer.exedescription pid process Token: SeShutdownPrivilege 2532 powercfg.exe Token: SeShutdownPrivilege 2072 powercfg.exe Token: SeShutdownPrivilege 2108 powercfg.exe Token: SeShutdownPrivilege 2576 powercfg.exe Token: SeShutdownPrivilege 2836 powercfg.exe Token: SeShutdownPrivilege 2860 powercfg.exe Token: SeShutdownPrivilege 2768 powercfg.exe Token: SeShutdownPrivilege 2812 powercfg.exe Token: SeLockMemoryPrivilege 2960 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
qsjxfirefkza.exedescription pid process target process PID 2816 wrote to memory of 2744 2816 qsjxfirefkza.exe conhost.exe PID 2816 wrote to memory of 2744 2816 qsjxfirefkza.exe conhost.exe PID 2816 wrote to memory of 2744 2816 qsjxfirefkza.exe conhost.exe PID 2816 wrote to memory of 2744 2816 qsjxfirefkza.exe conhost.exe PID 2816 wrote to memory of 2744 2816 qsjxfirefkza.exe conhost.exe PID 2816 wrote to memory of 2744 2816 qsjxfirefkza.exe conhost.exe PID 2816 wrote to memory of 2744 2816 qsjxfirefkza.exe conhost.exe PID 2816 wrote to memory of 2744 2816 qsjxfirefkza.exe conhost.exe PID 2816 wrote to memory of 2744 2816 qsjxfirefkza.exe conhost.exe PID 2816 wrote to memory of 2960 2816 qsjxfirefkza.exe explorer.exe PID 2816 wrote to memory of 2960 2816 qsjxfirefkza.exe explorer.exe PID 2816 wrote to memory of 2960 2816 qsjxfirefkza.exe explorer.exe PID 2816 wrote to memory of 2960 2816 qsjxfirefkza.exe explorer.exe PID 2816 wrote to memory of 2960 2816 qsjxfirefkza.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\943590af47af06d1bca1570bc116b25d.exe"C:\Users\Admin\AppData\Local\Temp\943590af47af06d1bca1570bc116b25d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2532 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "VJAODQWN"2⤵
- Launches sc.exe
PID:2388 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "VJAODQWN" binpath= "C:\ProgramData\ztngybkovyeb\qsjxfirefkza.exe" start= "auto"2⤵
- Launches sc.exe
PID:2564 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:264 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "VJAODQWN"2⤵
- Launches sc.exe
PID:2500
-
C:\ProgramData\ztngybkovyeb\qsjxfirefkza.exeC:\ProgramData\ztngybkovyeb\qsjxfirefkza.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2836 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2860 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2812 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2744
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5943590af47af06d1bca1570bc116b25d
SHA153eeb46310d02859984c6fa0787c5e6e3a274198
SHA256d36de86e88ad124a4d4707dc60f136a6782f29af17f76f3714e37dec30f03201
SHA512c3604262bcddc1bd092e29c17527d14f445ece56845b7a1596c735140a5590f947bc5796492f74fa1c673d3deeb69066de25a8ecd5f879ef6e15c44f0cf1f773