Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 09:37
Static task
static1
Behavioral task
behavioral1
Sample
fw3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fw3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
fw4.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
fw4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
fw5.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
fw5.exe
Resource
win10v2004-20241007-en
General
-
Target
fw4.exe
-
Size
132KB
-
MD5
f3585a8e4abba600aeeafbdfc4494535
-
SHA1
4950bbea2e80116456a88257909ad7d7d4322a97
-
SHA256
cd64d4fb480eb95963fc602cc86963ef08e2ddc2db52491208d187b775f3467b
-
SHA512
99b5920de4d61db0cb588030021d232874f83df91831f968725349bdb4f52e66c75956e7a30174259bfdd58b21beb9d207da25e08e17b4aba54a43e65702adcb
-
SSDEEP
3072:MlNR3vyv+qldiSJYa3ITl0eh3zcCraMv3NmmAh:M9+H5jITlBACrg9
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 4 IoCs
resource yara_rule behavioral4/memory/4248-6-0x0000000140000000-0x00000001407D3000-memory.dmp xmrig behavioral4/memory/4248-9-0x0000000140000000-0x00000001407D3000-memory.dmp xmrig behavioral4/memory/4248-8-0x0000000140000000-0x00000001407D3000-memory.dmp xmrig behavioral4/memory/4248-11-0x0000000140000000-0x00000001407D3000-memory.dmp xmrig -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msdwf = "C:\\Users\\Admin\\AppData\\Roaming\\msdwf.exe" fw4.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2364 set thread context of 4248 2364 fw4.exe 82 PID 2364 set thread context of 4748 2364 fw4.exe 89 -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 4748 msiexec.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4248 2364 fw4.exe 82 PID 2364 wrote to memory of 4748 2364 fw4.exe 89 PID 2364 wrote to memory of 4748 2364 fw4.exe 89 PID 2364 wrote to memory of 4748 2364 fw4.exe 89 PID 2364 wrote to memory of 4748 2364 fw4.exe 89 PID 2364 wrote to memory of 4748 2364 fw4.exe 89 PID 2364 wrote to memory of 4748 2364 fw4.exe 89 PID 2364 wrote to memory of 4748 2364 fw4.exe 89 PID 2364 wrote to memory of 4748 2364 fw4.exe 89 PID 2364 wrote to memory of 4748 2364 fw4.exe 89 PID 2364 wrote to memory of 4748 2364 fw4.exe 89 PID 2364 wrote to memory of 4748 2364 fw4.exe 89 PID 2364 wrote to memory of 4748 2364 fw4.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fw4.exe"C:\Users\Admin\AppData\Local\Temp\fw4.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\msiexec.exe-o 185.38.142.112:80 --cpu-max-threads-hint 50 -r 99992⤵PID:4248
-
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.wn9173@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999992⤵
- System Time Discovery
PID:4748
-