Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 06:28

General

  • Target

    75381d81f8f3abe16f38359576b1e18ec405bdb08bf9d239624d4e46eac79ea2.exe

  • Size

    348KB

  • MD5

    714e24fcb4a24e09651f8cc3431476f4

  • SHA1

    d3d171b1c502822b28ed6ea38701b024dc4184ec

  • SHA256

    75381d81f8f3abe16f38359576b1e18ec405bdb08bf9d239624d4e46eac79ea2

  • SHA512

    e212b1c627b70939ccdacc7f50bf904ba573c3df8b5b7ca97cfee600b57f9ee7821365a6bb1cb091db8490d18bf309fe66da8d102f8effc705070c76230223b0

  • SSDEEP

    6144:5SV65nRrV0hiOKlZly1IthuiqNaIZiIUHTJ+oVebpqIdsGin3XSeE:5SMeJ1KkicaGinTJ+EebpL0i

Malware Config

Signatures

  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 5 IoCs
  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\75381d81f8f3abe16f38359576b1e18ec405bdb08bf9d239624d4e46eac79ea2.exe
    "C:\Users\Admin\AppData\Local\Temp\75381d81f8f3abe16f38359576b1e18ec405bdb08bf9d239624d4e46eac79ea2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\DC.exe
      "C:\Users\Admin\AppData\Local\Temp\DC.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yMtS5yQe3I.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:372
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:4508
          • C:\Program Files\Uninstall Information\fontdrvhost.exe
            "C:\Program Files\Uninstall Information\fontdrvhost.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3436
      • C:\Users\Admin\AppData\Local\Temp\M.exe
        "C:\Users\Admin\AppData\Local\Temp\M.exe"
        2⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3704
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe delete "csrss"
          3⤵
          • Launches sc.exe
          PID:1408
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe create "csrss" binpath= "C:\ProgramData\SystemFiles\csrss.exe" start= "auto"
          3⤵
          • Launches sc.exe
          PID:3924
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop eventlog
          3⤵
          • Launches sc.exe
          PID:4620
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe start "csrss"
          3⤵
          • Launches sc.exe
          PID:632
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\M.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:316
          • C:\Windows\system32\choice.exe
            choice /C Y /N /D Y /T 3
            4⤵
              PID:2208
      • C:\ProgramData\SystemFiles\csrss.exe
        C:\ProgramData\SystemFiles\csrss.exe
        1⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Windows\system32\conhost.exe
          C:\Windows\system32\conhost.exe
          2⤵
            PID:1940
            • C:\ProgramData\SystemFiles\csrss.exe
              "C:\ProgramData\SystemFiles\csrss.exe"
              3⤵
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:116
              • C:\Windows\system32\conhost.exe
                conhost.exe
                4⤵
                • Checks BIOS information in registry
                • Suspicious use of AdjustPrivilegeToken
                PID:4928
          • C:\Windows\system32\conhost.exe
            conhost.exe
            2⤵
            • Checks BIOS information in registry
            • Suspicious use of AdjustPrivilegeToken
            PID:3796
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2348
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1456
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2940
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "scs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\sc.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3680
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\sc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4892
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "scs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\sc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3384
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1124
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2028
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2656
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Users\Default\fontdrvhost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4740
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Default\fontdrvhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1516
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\Default\fontdrvhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2220
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2552
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3620
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2276

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DC.exe

          Filesize

          2.1MB

          MD5

          edf4694b9b3b18ef7371f650eb8fcc4c

          SHA1

          61e52e88dc572c7f6e9e1ff318cf13724bdd4e9b

          SHA256

          294e8fcee3e1f99a91f6d7607524eb0936f206287096ba773bfe97ddeaf3323c

          SHA512

          9252b3b7486b5595e10cab6fd636d90e78baab5412324280f21407a7865a9568cc645645e51fc1472e63a63b1f7eff681370116840bbd3aed38cab15ec402ff4

        • C:\Users\Admin\AppData\Local\Temp\M.exe

          Filesize

          8.0MB

          MD5

          6fa4dd052d5650c20aa28e6b08e17cab

          SHA1

          6c6fc2970ccaf7e27d18c40f8d58e9762a5cfd66

          SHA256

          43dfef87cae40c7080ef1b9b7ac43448a56c47c3d24e692bb7ba00fcb9474508

          SHA512

          24b254e97ec5a0521f3b937a3448d8c5e9f3f6a400846659a1c18ab4955ccc352e2f5d30abe2e0748dbd93633a75a17a8c366135735449d1a2dabb7baec7c70b

        • C:\Users\Admin\AppData\Local\Temp\yMtS5yQe3I.bat

          Filesize

          182B

          MD5

          10edc6e6b52eb7e08c535d3853e33104

          SHA1

          ac57587ae28a166e1cc9df8789ed79e05b053bea

          SHA256

          896cf64a341caf594ba8c84c61cd03cf3c40b60e7ff3cc54ec324df91116a452

          SHA512

          b8079b3ae295f56b4554fba72441a080ab4cdca181e64ea33294d8ec40fe2ec319d1ddc114f801eaee350c0e243cb36f169009e2202fc838a56cbf99aa5928dc

        • C:\Windows\TEMP\yhhldulxgiai.sys

          Filesize

          14KB

          MD5

          0c0195c48b6b8582fa6f6373032118da

          SHA1

          d25340ae8e92a6d29f599fef426a2bc1b5217299

          SHA256

          11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5

          SHA512

          ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d

        • memory/116-121-0x00007FF6A4E30000-0x00007FF6A597F000-memory.dmp

          Filesize

          11.3MB

        • memory/116-146-0x00007FF6A4E30000-0x00007FF6A597F000-memory.dmp

          Filesize

          11.3MB

        • memory/748-41-0x00007FFECF020000-0x00007FFECFAE1000-memory.dmp

          Filesize

          10.8MB

        • memory/748-0-0x00007FFECF023000-0x00007FFECF025000-memory.dmp

          Filesize

          8KB

        • memory/748-3-0x00007FFECF020000-0x00007FFECFAE1000-memory.dmp

          Filesize

          10.8MB

        • memory/748-2-0x00007FFECF020000-0x00007FFECFAE1000-memory.dmp

          Filesize

          10.8MB

        • memory/748-1-0x0000000000740000-0x000000000079E000-memory.dmp

          Filesize

          376KB

        • memory/748-24-0x00007FFECF020000-0x00007FFECFAE1000-memory.dmp

          Filesize

          10.8MB

        • memory/748-32-0x00007FFECF023000-0x00007FFECF025000-memory.dmp

          Filesize

          8KB

        • memory/1768-66-0x00007FF665240000-0x00007FF665D8F000-memory.dmp

          Filesize

          11.3MB

        • memory/1768-83-0x00007FF665240000-0x00007FF665D8F000-memory.dmp

          Filesize

          11.3MB

        • memory/1940-67-0x0000000140000000-0x000000014000D000-memory.dmp

          Filesize

          52KB

        • memory/1940-68-0x0000000140000000-0x000000014000D000-memory.dmp

          Filesize

          52KB

        • memory/1940-69-0x0000000140000000-0x000000014000D000-memory.dmp

          Filesize

          52KB

        • memory/1940-70-0x0000000140000000-0x000000014000D000-memory.dmp

          Filesize

          52KB

        • memory/1940-71-0x0000000140000000-0x000000014000D000-memory.dmp

          Filesize

          52KB

        • memory/1940-74-0x0000000140000000-0x000000014000D000-memory.dmp

          Filesize

          52KB

        • memory/2892-113-0x00007FFECF020000-0x00007FFECFAE1000-memory.dmp

          Filesize

          10.8MB

        • memory/2892-42-0x000000001B560000-0x000000001B5B0000-memory.dmp

          Filesize

          320KB

        • memory/2892-50-0x000000001B530000-0x000000001B53E000-memory.dmp

          Filesize

          56KB

        • memory/2892-38-0x0000000002BB0000-0x0000000002BCC000-memory.dmp

          Filesize

          112KB

        • memory/2892-46-0x0000000002C20000-0x0000000002C2E000-memory.dmp

          Filesize

          56KB

        • memory/2892-44-0x000000001B510000-0x000000001B528000-memory.dmp

          Filesize

          96KB

        • memory/2892-35-0x0000000002A60000-0x0000000002A6E000-memory.dmp

          Filesize

          56KB

        • memory/2892-20-0x00007FFECF020000-0x00007FFECFAE1000-memory.dmp

          Filesize

          10.8MB

        • memory/2892-39-0x00007FFECF020000-0x00007FFECFAE1000-memory.dmp

          Filesize

          10.8MB

        • memory/2892-112-0x000000001BD00000-0x000000001BD6B000-memory.dmp

          Filesize

          428KB

        • memory/2892-40-0x0000000002A70000-0x0000000002A8C000-memory.dmp

          Filesize

          112KB

        • memory/2892-16-0x00007FFECF020000-0x00007FFECFAE1000-memory.dmp

          Filesize

          10.8MB

        • memory/2892-15-0x0000000000640000-0x0000000000864000-memory.dmp

          Filesize

          2.1MB

        • memory/2892-17-0x00007FFECF020000-0x00007FFECFAE1000-memory.dmp

          Filesize

          10.8MB

        • memory/2892-18-0x00007FFECF020000-0x00007FFECFAE1000-memory.dmp

          Filesize

          10.8MB

        • memory/2892-48-0x0000000002C30000-0x0000000002C3E000-memory.dmp

          Filesize

          56KB

        • memory/3704-36-0x00007FF7E3E70000-0x00007FF7E49BF000-memory.dmp

          Filesize

          11.3MB

        • memory/3704-62-0x00007FF7E3E70000-0x00007FF7E49BF000-memory.dmp

          Filesize

          11.3MB

        • memory/3796-93-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-84-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-101-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-100-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-99-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-97-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-106-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-105-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-104-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-102-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-98-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-96-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-94-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-95-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-92-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-91-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-89-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-90-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-88-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-86-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-85-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-87-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-82-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-103-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-81-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-77-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-115-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-125-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-124-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-118-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-75-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-78-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-76-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-122-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-123-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/3796-127-0x000001FE8C250000-0x000001FE8C270000-memory.dmp

          Filesize

          128KB

        • memory/4928-136-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/4928-134-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/4928-135-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/4928-137-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/4928-139-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/4928-141-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/4928-143-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/4928-142-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB

        • memory/4928-138-0x0000000140000000-0x0000000140AB6000-memory.dmp

          Filesize

          10.7MB