Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 09:37

General

  • Target

    fw4.exe

  • Size

    132KB

  • MD5

    f3585a8e4abba600aeeafbdfc4494535

  • SHA1

    4950bbea2e80116456a88257909ad7d7d4322a97

  • SHA256

    cd64d4fb480eb95963fc602cc86963ef08e2ddc2db52491208d187b775f3467b

  • SHA512

    99b5920de4d61db0cb588030021d232874f83df91831f968725349bdb4f52e66c75956e7a30174259bfdd58b21beb9d207da25e08e17b4aba54a43e65702adcb

  • SSDEEP

    3072:MlNR3vyv+qldiSJYa3ITl0eh3zcCraMv3NmmAh:M9+H5jITlBACrg9

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fw4.exe
    "C:\Users\Admin\AppData\Local\Temp\fw4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\system32\msiexec.exe
      -o 185.38.142.112:80 --cpu-max-threads-hint 50 -r 9999
      2⤵
        PID:4248
      • C:\Windows\system32\msiexec.exe
        -P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.wn9173@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 99999
        2⤵
        • System Time Discovery
        PID:4748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4248-6-0x0000000140000000-0x00000001407D3000-memory.dmp

      Filesize

      7.8MB

    • memory/4248-9-0x0000000140000000-0x00000001407D3000-memory.dmp

      Filesize

      7.8MB

    • memory/4248-8-0x0000000140000000-0x00000001407D3000-memory.dmp

      Filesize

      7.8MB

    • memory/4248-11-0x0000000140000000-0x00000001407D3000-memory.dmp

      Filesize

      7.8MB

    • memory/4748-13-0x0000000140000000-0x0000000140383000-memory.dmp

      Filesize

      3.5MB

    • memory/4748-14-0x0000000140000000-0x0000000140383000-memory.dmp

      Filesize

      3.5MB

    • memory/4748-15-0x0000000140000000-0x0000000140383000-memory.dmp

      Filesize

      3.5MB

    • memory/4748-17-0x0000000140000000-0x0000000140383000-memory.dmp

      Filesize

      3.5MB