Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 01:57
Behavioral task
behavioral1
Sample
DeadMined.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
DeadMined.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DeadMined.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
DeadMined.exe
-
Size
56KB
-
MD5
499308c111f6aedc6fc71df066aa3bdd
-
SHA1
edafc28b68a50f1bb3aa49141d64f43618cf8ea6
-
SHA256
e4d4485983a7e13e57f917476bad64d0d4812b9041c86b07f9dddd7a93c61c87
-
SHA512
ac40f8408328d24fe33a9ce03d1c2b87bb3dec5f063e58b2f53942e701126804f8ad71708a938b8e88465a968e8ecdec61930475b7bb6716945ffcb2f4de198a
-
SSDEEP
768:DwoQxEyV72/68RXclX7Yq0QgW+79bk1klbAvdXAypaTCqt68vTXqJ1uOiz4s/bYi:DYKGUrMFY9bk1kU8vx
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2520-1-0x0000000000230000-0x0000000000244000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Program crash 1 IoCs
pid pid_target Process procid_target 4020 2520 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeadMined.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2520 DeadMined.exe Token: SeDebugPrivilege 588 taskmgr.exe Token: SeSystemProfilePrivilege 588 taskmgr.exe Token: SeCreateGlobalPrivilege 588 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe 588 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DeadMined.exe"C:\Users\Admin\AppData\Local\Temp\DeadMined.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 17162⤵
- Program crash
PID:4020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2520 -ip 25201⤵PID:2564
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:588