Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 10:28
Static task
static1
Behavioral task
behavioral1
Sample
gaozw40v.exe
Resource
win7-20240903-en
General
-
Target
gaozw40v.exe
-
Size
5.0MB
-
MD5
7d8f7b0c924a228c2ca81d3959d0b604
-
SHA1
972eae6c3f80dd0be06fb73bb64553cd10360873
-
SHA256
95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48
-
SHA512
6c5b93313fabc4bc0aab93da27bcbabb422fceef2bca9185d0cdc4e634240df9699b05389308e06ddedc604430a6c0164de8763b35d1268dce37e052c2c4bb81
-
SSDEEP
98304:VNvN3Y8Dz2X5ny7kOywy+VHoJzeDBuqgeYY8S91anzz9oq+T:FnaX5nfitVuzUBuDH88zpUT
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/3060-24-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3060-22-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3060-25-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3060-21-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3060-18-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3060-23-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3060-19-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3060-26-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 476 Process not Found 1732 bbwduuyjdzsp.exe -
Loads dropped DLL 1 IoCs
pid Process 476 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1732 set thread context of 2992 1732 bbwduuyjdzsp.exe 40 PID 1732 set thread context of 3060 1732 bbwduuyjdzsp.exe 41 -
resource yara_rule behavioral1/memory/3060-14-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-15-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-24-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-22-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-25-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-21-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-18-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-17-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-23-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-19-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-16-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-13-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3060-26-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2000 sc.exe 2312 sc.exe 2080 sc.exe 1228 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2484 gaozw40v.exe 2484 gaozw40v.exe 2484 gaozw40v.exe 2484 gaozw40v.exe 1732 bbwduuyjdzsp.exe 1732 bbwduuyjdzsp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 3060 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2992 1732 bbwduuyjdzsp.exe 40 PID 1732 wrote to memory of 2992 1732 bbwduuyjdzsp.exe 40 PID 1732 wrote to memory of 2992 1732 bbwduuyjdzsp.exe 40 PID 1732 wrote to memory of 2992 1732 bbwduuyjdzsp.exe 40 PID 1732 wrote to memory of 2992 1732 bbwduuyjdzsp.exe 40 PID 1732 wrote to memory of 2992 1732 bbwduuyjdzsp.exe 40 PID 1732 wrote to memory of 2992 1732 bbwduuyjdzsp.exe 40 PID 1732 wrote to memory of 2992 1732 bbwduuyjdzsp.exe 40 PID 1732 wrote to memory of 2992 1732 bbwduuyjdzsp.exe 40 PID 1732 wrote to memory of 3060 1732 bbwduuyjdzsp.exe 41 PID 1732 wrote to memory of 3060 1732 bbwduuyjdzsp.exe 41 PID 1732 wrote to memory of 3060 1732 bbwduuyjdzsp.exe 41 PID 1732 wrote to memory of 3060 1732 bbwduuyjdzsp.exe 41 PID 1732 wrote to memory of 3060 1732 bbwduuyjdzsp.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\gaozw40v.exe"C:\Users\Admin\AppData\Local\Temp\gaozw40v.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "YIFRWLJF"2⤵
- Launches sc.exe
PID:2000
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "YIFRWLJF" binpath= "C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe" start= "auto"2⤵
- Launches sc.exe
PID:2312
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:1228
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "YIFRWLJF"2⤵
- Launches sc.exe
PID:2080
-
-
C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exeC:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2992
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD57d8f7b0c924a228c2ca81d3959d0b604
SHA1972eae6c3f80dd0be06fb73bb64553cd10360873
SHA25695c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48
SHA5126c5b93313fabc4bc0aab93da27bcbabb422fceef2bca9185d0cdc4e634240df9699b05389308e06ddedc604430a6c0164de8763b35d1268dce37e052c2c4bb81