Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/12/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe
Resource
win7-20241010-en
General
-
Target
4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe
-
Size
2.5MB
-
MD5
b4a802912838add056fb0aca7ee3a835
-
SHA1
6c113b8a01c74594597ae873d12cd88fe2de789e
-
SHA256
4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488
-
SHA512
1b2bfe779d7d16f1349311cab87f564853f70e43de618aabbf75a12a87def3262c3fb5b09533b15881589b98f4bb7fa8886db004e5f2bd0e960cbe87c08c653b
-
SSDEEP
49152:8dZ1pGrfiTny0UaSLUp1pkrV8+i+wo4gOsOhsxWfFmgCdVn/xwOhhb:+3Tn3Uv4p1pqTi+wLm7gEgCdd/m
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2692-25-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2692-19-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2692-24-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2692-23-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2692-22-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2692-21-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2692-18-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2692-26-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 476 Process not Found 2276 winmngrsa.exe -
Loads dropped DLL 1 IoCs
pid Process 476 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2276 set thread context of 2752 2276 winmngrsa.exe 39 PID 2276 set thread context of 2692 2276 winmngrsa.exe 40 -
resource yara_rule behavioral1/memory/2692-14-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-13-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-25-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-19-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-24-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-23-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-22-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-21-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-18-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-17-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-16-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-15-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2692-26-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2696 sc.exe 2788 sc.exe 2828 sc.exe 2784 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1692 4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe 1692 4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe 1692 4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe 1692 4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe 2276 winmngrsa.exe 2276 winmngrsa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 2692 dwm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2752 2276 winmngrsa.exe 39 PID 2276 wrote to memory of 2752 2276 winmngrsa.exe 39 PID 2276 wrote to memory of 2752 2276 winmngrsa.exe 39 PID 2276 wrote to memory of 2752 2276 winmngrsa.exe 39 PID 2276 wrote to memory of 2752 2276 winmngrsa.exe 39 PID 2276 wrote to memory of 2752 2276 winmngrsa.exe 39 PID 2276 wrote to memory of 2752 2276 winmngrsa.exe 39 PID 2276 wrote to memory of 2752 2276 winmngrsa.exe 39 PID 2276 wrote to memory of 2752 2276 winmngrsa.exe 39 PID 2276 wrote to memory of 2692 2276 winmngrsa.exe 40 PID 2276 wrote to memory of 2692 2276 winmngrsa.exe 40 PID 2276 wrote to memory of 2692 2276 winmngrsa.exe 40 PID 2276 wrote to memory of 2692 2276 winmngrsa.exe 40 PID 2276 wrote to memory of 2692 2276 winmngrsa.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe"C:\Users\Admin\AppData\Local\Temp\4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WinMngr"2⤵
- Launches sc.exe
PID:2696
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WinMngr" binpath= "C:\ProgramData\WinMngr\winmngrsa.exe" start= "auto"2⤵
- Launches sc.exe
PID:2788
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WinMngr"2⤵
- Launches sc.exe
PID:2784
-
-
C:\ProgramData\WinMngr\winmngrsa.exeC:\ProgramData\WinMngr\winmngrsa.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2752
-
-
C:\Windows\system32\dwm.exedwm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5b4a802912838add056fb0aca7ee3a835
SHA16c113b8a01c74594597ae873d12cd88fe2de789e
SHA2564b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488
SHA5121b2bfe779d7d16f1349311cab87f564853f70e43de618aabbf75a12a87def3262c3fb5b09533b15881589b98f4bb7fa8886db004e5f2bd0e960cbe87c08c653b