Overview
overview
10Static
static
3NewTriage3...11.exe
windows10-ltsc 2021-x64
10NewTriage3...48.exe
windows10-ltsc 2021-x64
10NewTriage3...44.exe
windows10-ltsc 2021-x64
10NewTriage3...07.exe
windows10-ltsc 2021-x64
10NewTriage3...19.exe
windows10-ltsc 2021-x64
10NewTriage3...94.exe
windows10-ltsc 2021-x64
10NewTriage3...18.exe
windows10-ltsc 2021-x64
10NewTriage3...99.exe
windows10-ltsc 2021-x64
10NewTriage3...60.exe
windows10-ltsc 2021-x64
10NewTriage3...32.exe
windows10-ltsc 2021-x64
10NewTriage3...69.exe
windows10-ltsc 2021-x64
10NewTriage3...75.exe
windows10-ltsc 2021-x64
10NewTriage3...56.exe
windows10-ltsc 2021-x64
10NewTriage3...95.exe
windows10-ltsc 2021-x64
10NewTriage3...28.exe
windows10-ltsc 2021-x64
10NewTriage3...68.exe
windows10-ltsc 2021-x64
10NewTriage3...09.exe
windows10-ltsc 2021-x64
10NewTriage3...48.exe
windows10-ltsc 2021-x64
10NewTriage3...13.exe
windows10-ltsc 2021-x64
10NewTriage3...53.exe
windows10-ltsc 2021-x64
10NewTriage3...90.exe
windows10-ltsc 2021-x64
10NewTriage3...83.exe
windows10-ltsc 2021-x64
10NewTriage3...23.exe
windows10-ltsc 2021-x64
10NewTriage3...33.exe
windows10-ltsc 2021-x64
10NewTriage3...13.exe
windows10-ltsc 2021-x64
10NewTriage3...13.exe
windows10-ltsc 2021-x64
10NewTriage3...70.exe
windows10-ltsc 2021-x64
10NewTriage3...09.exe
windows10-ltsc 2021-x64
10NewTriage3...95.exe
windows10-ltsc 2021-x64
10NewTriage3...24.exe
windows10-ltsc 2021-x64
10NewTriage3...29.exe
windows10-ltsc 2021-x64
10NewTriage3...88.exe
windows10-ltsc 2021-x64
10Analysis
-
max time kernel
3551s -
max time network
3596s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25-11-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
NewTriage32/0FIQyV6Y7Xr5l2Babpdw7BxF3pmGAW_555111.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
NewTriage32/0eWaFVMME4i8CeUdl7GzPYBotmpUYn_111448.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
NewTriage32/3Z3Mp2Wmizxd2DIEsM7DDf16jBK4BA_454444.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
NewTriage32/515bZt5WA4BFG0Pd00et3zugAykoVc_370007.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
NewTriage32/9wDXQIrr9O18lbO5AuiBBoF4HIiLvG_730619.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
NewTriage32/BluucUtINzhMhP7UEOzRvKWeKF3ElC_177794.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
NewTriage32/CIM13G2tG1jPH0GDc5TDUnmeJctQOY_834418.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
NewTriage32/ERzZXEU0OucmBUsACZUNgjT9eYaf9x_450599.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
NewTriage32/F9q6fc3Je5burTzPjkJ2c4eFD9J3Z2_837060.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
NewTriage32/GDJKTshwTTLwrERmdFI6tGe20KTcGl_569332.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
NewTriage32/IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
NewTriage32/MEMLrQGaysU0Is4D0tVyqiy2l3AP1A_588775.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
NewTriage32/MQjAVvRiDpRINMafdaHT8IsBj8utPd_192456.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
NewTriage32/Qv7F7BJUQxdXm9nQiEDbDybnIHdHB8_343595.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
NewTriage32/T4LQPLErSXulryhem4uQ4QAbpfAZgL_342828.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
NewTriage32/UC4JijktZZpNqtHFPFf6AbUsbAPuLW_287868.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
NewTriage32/WqgNXU5K4wPnsIBxhQG6JeXkPxu9wZ_876009.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
NewTriage32/XElH7OHKbWMiQUDjRkaewp4oy6evYZ_819648.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
NewTriage32/YfJZ6cyueGSX8fNFuC9lMEz5Mc7pRu_129913.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
NewTriage32/ZiALmE2W07FOULPcNq4hn3lHtAYRzS_389753.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
NewTriage32/j04MjpDguJTg7zkKZ6kXScxHXgi5Gc_751390.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
NewTriage32/llFIdB78FJ7woex4wNLgKfvv0RnwsC_791083.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
NewTriage32/ngs5lEYM6AwkvNLObKj9Q34VxXT6n0_857823.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
NewTriage32/oZvS9DYOP2SnifshaaszUbeVPg2d6N_889133.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
NewTriage32/rWJoKbSTDehykfNbgA6Qp4MWcoesal_416113.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
NewTriage32/s5QNrz2UUhjTJ4WiGpMJ2587e4Q3vg_719213.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
NewTriage32/swBY7rFoRs0zzlfS4h3sIxgDqrXvqY_624670.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
NewTriage32/vUgR5kHOCtyOycAbgZqGF3hh5yJUyL_854309.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral29
Sample
NewTriage32/vg0WFypYbJ92oY510TY6SSMowUeiz1_805795.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral30
Sample
NewTriage32/vi2OgeX7SWjHNKNojgjtBizpwdveaR_792924.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral31
Sample
NewTriage32/x5fl9njKlhz4fcmIKPC5kcPMtkBjNE_323629.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
NewTriage32/IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exe
-
Size
2.5MB
-
MD5
dc4de596b27633f9835e6bcc3aee08eb
-
SHA1
e391f7ae9af449836b34b6c4b689cda02e53c71b
-
SHA256
6fe7e5d9b66bfa2a2d8fac07483f35f65520b6baef87cde3b99c513f7ade5cef
-
SHA512
ec6ac054952ae520e3e77a6edeed6cc0ae03acea68039aecfaf57cfffa64597bc3c2841d4abfa1fe9324f71bb6eb748c97201f9e70a9815c4514d975a609816f
-
SSDEEP
49152:Kgf5bRKh3xW0yvsohrvKwgsORbI6WtEaFTGFyCTBIHef:VQ30goFvKwHQbMpTGFIHef
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 11 IoCs
Processes:
resource yara_rule behavioral11/memory/2764-7-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral11/memory/2764-6-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral11/memory/2764-9-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral11/memory/2764-12-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral11/memory/2764-13-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral11/memory/2764-11-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral11/memory/2764-10-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral11/memory/2764-14-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral11/memory/2764-17-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral11/memory/2764-18-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral11/memory/2764-19-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Suspicious use of SetThreadContext 1 IoCs
Processes:
IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exedescription pid process target process PID 4188 set thread context of 2764 4188 IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exe explorer.exe -
Processes:
resource yara_rule behavioral11/memory/2764-1-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-3-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-2-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-4-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-5-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-7-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-6-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-9-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-12-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-13-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-11-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-10-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-14-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-17-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-18-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral11/memory/2764-19-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\ServiceState\WinHttpAutoProxySvc\Data\cachev3.dat svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-5f-f6-b6-53-b3\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-5f-f6-b6-53-b3 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-5f-f6-b6-53-b3\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-5f-f6-b6-53-b3\WpadDecisionTime = c4dcb75ca03fdb01 svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exepid process 4188 IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
explorer.exesvchost.exedescription pid process Token: SeLockMemoryPrivilege 2764 explorer.exe Token: SeLockMemoryPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2412 svchost.exe Token: SeCreatePagefilePrivilege 2412 svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exedescription pid process target process PID 4188 wrote to memory of 2764 4188 IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exe explorer.exe PID 4188 wrote to memory of 2764 4188 IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exe explorer.exe PID 4188 wrote to memory of 2764 4188 IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exe explorer.exe PID 4188 wrote to memory of 2764 4188 IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exe explorer.exe PID 4188 wrote to memory of 2764 4188 IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NewTriage32\IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exe"C:\Users\Admin\AppData\Local\Temp\NewTriage32\IxXF7PeGlVVyHSXk9kYDLLDorJ5p7J_964969.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2412