Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe
Resource
win7-20240903-en
General
-
Target
95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe
-
Size
5.0MB
-
MD5
7d8f7b0c924a228c2ca81d3959d0b604
-
SHA1
972eae6c3f80dd0be06fb73bb64553cd10360873
-
SHA256
95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48
-
SHA512
6c5b93313fabc4bc0aab93da27bcbabb422fceef2bca9185d0cdc4e634240df9699b05389308e06ddedc604430a6c0164de8763b35d1268dce37e052c2c4bb81
-
SSDEEP
98304:VNvN3Y8Dz2X5ny7kOywy+VHoJzeDBuqgeYY8S91anzz9oq+T:FnaX5nfitVuzUBuDH88zpUT
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral2/memory/3700-17-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3700-19-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3700-21-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3700-23-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3700-22-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3700-20-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3700-16-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3700-24-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1792 bbwduuyjdzsp.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1792 set thread context of 1048 1792 bbwduuyjdzsp.exe 93 PID 1792 set thread context of 3700 1792 bbwduuyjdzsp.exe 94 -
resource yara_rule behavioral2/memory/3700-10-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-12-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-17-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-19-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-21-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-23-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-22-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-20-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-16-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-15-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-11-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-13-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3700-24-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5008 sc.exe 1716 sc.exe 4472 sc.exe 1084 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2268 95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe 2268 95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe 2268 95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe 2268 95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe 1792 bbwduuyjdzsp.exe 1792 bbwduuyjdzsp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 3700 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1048 1792 bbwduuyjdzsp.exe 93 PID 1792 wrote to memory of 1048 1792 bbwduuyjdzsp.exe 93 PID 1792 wrote to memory of 1048 1792 bbwduuyjdzsp.exe 93 PID 1792 wrote to memory of 1048 1792 bbwduuyjdzsp.exe 93 PID 1792 wrote to memory of 1048 1792 bbwduuyjdzsp.exe 93 PID 1792 wrote to memory of 1048 1792 bbwduuyjdzsp.exe 93 PID 1792 wrote to memory of 1048 1792 bbwduuyjdzsp.exe 93 PID 1792 wrote to memory of 1048 1792 bbwduuyjdzsp.exe 93 PID 1792 wrote to memory of 1048 1792 bbwduuyjdzsp.exe 93 PID 1792 wrote to memory of 3700 1792 bbwduuyjdzsp.exe 94 PID 1792 wrote to memory of 3700 1792 bbwduuyjdzsp.exe 94 PID 1792 wrote to memory of 3700 1792 bbwduuyjdzsp.exe 94 PID 1792 wrote to memory of 3700 1792 bbwduuyjdzsp.exe 94 PID 1792 wrote to memory of 3700 1792 bbwduuyjdzsp.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe"C:\Users\Admin\AppData\Local\Temp\95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "YIFRWLJF"2⤵
- Launches sc.exe
PID:1084
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "YIFRWLJF" binpath= "C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe" start= "auto"2⤵
- Launches sc.exe
PID:5008
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:1716
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "YIFRWLJF"2⤵
- Launches sc.exe
PID:4472
-
-
C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exeC:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1048
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD57d8f7b0c924a228c2ca81d3959d0b604
SHA1972eae6c3f80dd0be06fb73bb64553cd10360873
SHA25695c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48
SHA5126c5b93313fabc4bc0aab93da27bcbabb422fceef2bca9185d0cdc4e634240df9699b05389308e06ddedc604430a6c0164de8763b35d1268dce37e052c2c4bb81