Overview
overview
7Static
static
7images.exe
windows7-x64
7images.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$R0/NsCpuC...32.exe
windows7-x64
7$R0/NsCpuC...32.exe
windows10-2004-x64
7$R0/NsCpuC...64.exe
windows7-x64
7$R0/NsCpuC...64.exe
windows10-2004-x64
7$R0/NsGpuCNMiner.exe
windows7-x64
7$R0/NsGpuCNMiner.exe
windows10-2004-x64
7$R0/load.exe
windows7-x64
7$R0/load.exe
windows10-2004-x64
7$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3General
-
Target
images.scr)
-
Size
4.5MB
-
Sample
241120-l9mkfazmfp
-
MD5
32f21ab8cf9b96e8ba86395a0edc2e4f
-
SHA1
2a5b3c07e32b3b2b0c1ef33a10685027703440ec
-
SHA256
20389c7d417ec512e18bb246a693ce37e041390b6cf1cdd5dca0728b709f910d
-
SHA512
d7fc84e52ad671f55f07bd46a06ea3b881606f21c457e21d50bc45e08339926d13890792503d3bca46edc866f7a739cf7b845f0182ed18bcdb70bca1db011f6c
-
SSDEEP
98304:DMUaI9OMzejqikpYbAI7XLyhq6IvorAJKn6kD801cgl0+BhV1C8q0DBAvD:I8Oxy61y6g38ScglnBh20FMD
Behavioral task
behavioral1
Sample
images.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
images.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$R0/NsCpuCNMiner32.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$R0/NsCpuCNMiner32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$R0/NsCpuCNMiner64.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$R0/NsCpuCNMiner64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$R0/NsGpuCNMiner.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$R0/NsGpuCNMiner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$R0/load.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$R0/load.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
images.scr)
-
Size
4.5MB
-
MD5
32f21ab8cf9b96e8ba86395a0edc2e4f
-
SHA1
2a5b3c07e32b3b2b0c1ef33a10685027703440ec
-
SHA256
20389c7d417ec512e18bb246a693ce37e041390b6cf1cdd5dca0728b709f910d
-
SHA512
d7fc84e52ad671f55f07bd46a06ea3b881606f21c457e21d50bc45e08339926d13890792503d3bca46edc866f7a739cf7b845f0182ed18bcdb70bca1db011f6c
-
SSDEEP
98304:DMUaI9OMzejqikpYbAI7XLyhq6IvorAJKn6kD801cgl0+BhV1C8q0DBAvD:I8Oxy61y6g38ScglnBh20FMD
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
c17103ae9072a06da581dec998343fc1
-
SHA1
b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
-
SHA256
dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
-
SHA512
d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
SSDEEP
192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw
Score3/10 -
-
-
Target
$PLUGINSDIR/inetc.dll
-
Size
21KB
-
MD5
d7a3fa6a6c738b4a3c40d5602af20b08
-
SHA1
34fc75d97f640609cb6cadb001da2cb2c0b3538a
-
SHA256
67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
-
SHA512
75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
SSDEEP
384:oW4gLK82JvtosNCPhXKJ18hcEP1+f+pvMPbkdTg1Zahzs60Ac9khYLMkIX0+Gbyk:oW4i/2JloB5IQ9AhkwZaKRu
Score3/10 -
-
-
Target
$R0/NsCpuCNMiner32.exe
-
Size
1.4MB
-
MD5
3afeb8e9af02a33ff71bf2f6751cae3a
-
SHA1
fd358cfe41c7aa3aa9e4cf62f832d8ae6baa8107
-
SHA256
a0eba3fda0d7b22a5d694105ec700df7c7012ddc4ae611c3071ef858e2c69f08
-
SHA512
11a2c12d7384d2743d25b9e28fc4ea0c3e2771aca92875fd3350f457df66c66827d175f67108f1a56d958f3b1163f3a89eedb8919bf7973d037241a1e59231d5
-
SSDEEP
24576:gWKqa4hnzP3w7L3rmZmpk7FSQFW2iJ+N07/TwYV1CdZdQ+4lT+iFgiGTtswAtdz:gSrwf3aZmpOFU2iQNIUc1LxGTtswgd
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$R0/NsCpuCNMiner64.exe
-
Size
1.5MB
-
MD5
eedb9d86ae8abc65fa7ac7c6323d4e8f
-
SHA1
ce1fbf382e89146ea5a22ae551b68198c45f40e4
-
SHA256
d0326f0ddce4c00f93682e3a6f55a3125f6387e959e9ed6c5e5584e78e737078
-
SHA512
9de3390197a02965feed6acdc77a292c0ef160e466fbfc9500fa7de17b0225a935127da71029cb8006bc7a5f4b5457319362b7a7caf4c0bf92174d139ed52ab5
-
SSDEEP
24576:Mf79KQimeoyEgM8dSGDeCAQ4GYwEkYEDI3BiiVzKJo23bvH5xh8wtDzgClYAdC51:b3EciPG9E/LBVeJo2Vsw57lYAA51
Score7/10-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$R0/NsGpuCNMiner.exe
-
Size
1.5MB
-
MD5
35d2c42b6ee0acbce9dfe8cc418fe5d8
-
SHA1
66b965d1ee4013c80f7e0e27725e43f3d316325a
-
SHA256
7a2a860bb344526e8546acd172522b4d276a4647f43dd4720281d40e390b283e
-
SHA512
00d89a686995d7b2415f6de5786a175232606cb962744149129ed329fcbf0d4ee076e9bc1125adcaa58571ade5f22372b0bef2d2af78dd12378654e6e23b5ebf
-
SSDEEP
49152:FG/58i4P5hIFmiMhgmo+e5i2vkCzqYQjUs:wvw5mmed+e5hsCL+
Score7/10 -
-
-
Target
$R0/load.exe
-
Size
44KB
-
MD5
bc6db57b6f9118ecb27625cb7646688a
-
SHA1
0f864d398c98f3bde6304145b3f65fa65e62d320
-
SHA256
115d327daa7b69fac688a274f18629d3a0dbc92726413af45ab71e51bd03df28
-
SHA512
815d2195c8e8e0e4a9d922f9c6e17259be78ceda370968c2aa1a8fbc82717cdc7d255dbfa9f95e8dab931c18f03d08eef3fb0e3231a8f01cb0bfda64eb53d754
-
SSDEEP
768:6HJd0TpH2+bQ2dUWVX9Hfv1JMWmtLEJOyuBxG0D3mjfS3XJcM8dMkrClK1EffNHJ:6pgpHzb9dZVX9fHMvG0D3XJcMBK1KYqF
Score7/10-
Loads dropped DLL
-
-
-
Target
$PLUGINSDIR/inetc.dll
-
Size
21KB
-
MD5
d7a3fa6a6c738b4a3c40d5602af20b08
-
SHA1
34fc75d97f640609cb6cadb001da2cb2c0b3538a
-
SHA256
67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
-
SHA512
75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
SSDEEP
384:oW4gLK82JvtosNCPhXKJ18hcEP1+f+pvMPbkdTg1Zahzs60Ac9khYLMkIX0+Gbyk:oW4i/2JloB5IQ9AhkwZaKRu
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1