Analysis
-
max time kernel
121s -
max time network
289s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
3e4dd2a19e5c08068bfb5c980732ff696a0e950b4bc6f0efe6e7e47a567793d6.exe
Resource
win7-20240903-en
General
-
Target
3e4dd2a19e5c08068bfb5c980732ff696a0e950b4bc6f0efe6e7e47a567793d6.exe
-
Size
2.6MB
-
MD5
494cc0e2a4aa4fe252099c1499a5fd4e
-
SHA1
4c8cc67beebc0e9f015ae3113957aab4dbf1285f
-
SHA256
3e4dd2a19e5c08068bfb5c980732ff696a0e950b4bc6f0efe6e7e47a567793d6
-
SHA512
dc4567e49456976f778d2da6561d15d764519c71424ce8038ece137c5c50794a8d056674fce4ee810ef46d6558a12835ecc24aaa123d6ef4184515e4ef737a58
-
SSDEEP
49152:lt6NLonrxnS/+Dwr/5UeLFeEhsG89y+6rxvVsveHZMlJ8eH4elKpGOyUw:lIyxv2/2Eu9y+gsveHZM8exmyUw
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/2384-10-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2384-14-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2384-16-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2384-15-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2384-13-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2384-11-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2384-17-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2384-18-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2384-19-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 480 Process not Found 2732 Any Desk -
Loads dropped DLL 1 IoCs
pid Process 480 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2732 set thread context of 2384 2732 Any Desk 40 -
resource yara_rule behavioral1/memory/2384-5-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-6-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-7-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-8-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-10-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-9-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-14-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-15-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-13-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-11-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-18-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2384-19-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2336 sc.exe 1964 sc.exe 1020 sc.exe 2416 sc.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2460 3e4dd2a19e5c08068bfb5c980732ff696a0e950b4bc6f0efe6e7e47a567793d6.exe 2460 3e4dd2a19e5c08068bfb5c980732ff696a0e950b4bc6f0efe6e7e47a567793d6.exe 2460 3e4dd2a19e5c08068bfb5c980732ff696a0e950b4bc6f0efe6e7e47a567793d6.exe 2460 3e4dd2a19e5c08068bfb5c980732ff696a0e950b4bc6f0efe6e7e47a567793d6.exe 2732 Any Desk -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 2384 explorer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2384 2732 Any Desk 40 PID 2732 wrote to memory of 2384 2732 Any Desk 40 PID 2732 wrote to memory of 2384 2732 Any Desk 40 PID 2732 wrote to memory of 2384 2732 Any Desk 40 PID 2732 wrote to memory of 2384 2732 Any Desk 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e4dd2a19e5c08068bfb5c980732ff696a0e950b4bc6f0efe6e7e47a567793d6.exe"C:\Users\Admin\AppData\Local\Temp\3e4dd2a19e5c08068bfb5c980732ff696a0e950b4bc6f0efe6e7e47a567793d6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Any Desk"2⤵
- Launches sc.exe
PID:2336
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Any Desk" binpath= "C:\ProgramData\Any Desk" start= "auto"2⤵
- Launches sc.exe
PID:1964
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:1020
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Any Desk"2⤵
- Launches sc.exe
PID:2416
-
-
C:\ProgramData\Any Desk"C:\ProgramData\Any Desk"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5494cc0e2a4aa4fe252099c1499a5fd4e
SHA14c8cc67beebc0e9f015ae3113957aab4dbf1285f
SHA2563e4dd2a19e5c08068bfb5c980732ff696a0e950b4bc6f0efe6e7e47a567793d6
SHA512dc4567e49456976f778d2da6561d15d764519c71424ce8038ece137c5c50794a8d056674fce4ee810ef46d6558a12835ecc24aaa123d6ef4184515e4ef737a58