Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe
Resource
win10v2004-20241007-en
General
-
Target
8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe
-
Size
4.9MB
-
MD5
3d375d10b594f69c51b80948ec0e4c03
-
SHA1
439779b78363df27d5874efb256aa5e415e0b8b3
-
SHA256
8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704
-
SHA512
635d39a32aa3c01cf2d7c5910639da9dbc7f661daba92d0b6c6d543123aa84bfac86dc7c72d6f88ace93d4d2b520e5020094d11f8d78c6859ea68265e8dad560
-
SSDEEP
98304:VlPQoHOVR78LR77DWaPL+RbDQuAv9QyhT/UxEdmrm:VGoHWB6Uaz+RfQBlhL8Edf
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/4708-7-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-6-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-12-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-11-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-10-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-9-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-13-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-15-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-16-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 220 powercfg.exe 1744 powercfg.exe 1332 powercfg.exe 4664 powercfg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4132 set thread context of 4708 4132 8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe 104 -
resource yara_rule behavioral2/memory/4708-1-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-3-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-2-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-4-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-7-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-6-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-5-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-12-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-11-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-10-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-9-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-13-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-15-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-16-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4132 8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe 4132 8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe 4132 8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe 4132 8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe 4132 8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 1744 powercfg.exe Token: SeCreatePagefilePrivilege 1744 powercfg.exe Token: SeShutdownPrivilege 1332 powercfg.exe Token: SeCreatePagefilePrivilege 1332 powercfg.exe Token: SeShutdownPrivilege 4664 powercfg.exe Token: SeCreatePagefilePrivilege 4664 powercfg.exe Token: SeShutdownPrivilege 220 powercfg.exe Token: SeCreatePagefilePrivilege 220 powercfg.exe Token: SeLockMemoryPrivilege 4708 explorer.exe Token: SeLockMemoryPrivilege 4708 explorer.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe -
Suspicious use of SendNotifyMessage 53 IoCs
pid Process 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe 4708 explorer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4132 wrote to memory of 4708 4132 8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe 104 PID 4132 wrote to memory of 4708 4132 8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe 104 PID 4132 wrote to memory of 4708 4132 8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe 104 PID 4132 wrote to memory of 4708 4132 8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe 104 PID 4132 wrote to memory of 4708 4132 8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe"C:\Users\Admin\AppData\Local\Temp\8f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4708
-