Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/12/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe
Resource
win7-20241010-en
General
-
Target
4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe
-
Size
2.5MB
-
MD5
b4a802912838add056fb0aca7ee3a835
-
SHA1
6c113b8a01c74594597ae873d12cd88fe2de789e
-
SHA256
4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488
-
SHA512
1b2bfe779d7d16f1349311cab87f564853f70e43de618aabbf75a12a87def3262c3fb5b09533b15881589b98f4bb7fa8886db004e5f2bd0e960cbe87c08c653b
-
SSDEEP
49152:8dZ1pGrfiTny0UaSLUp1pkrV8+i+wo4gOsOhsxWfFmgCdVn/xwOhhb:+3Tn3Uv4p1pqTi+wLm7gEgCdd/m
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral2/memory/1092-17-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1092-16-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1092-21-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1092-23-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1092-22-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1092-20-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1092-19-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1092-24-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 5088 winmngrsa.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5088 set thread context of 2648 5088 winmngrsa.exe 92 PID 5088 set thread context of 1092 5088 winmngrsa.exe 93 -
resource yara_rule behavioral2/memory/1092-11-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-15-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-17-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-16-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-13-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-12-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-14-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-21-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-23-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-22-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-20-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-19-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1092-24-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3936 sc.exe 1636 sc.exe 3588 sc.exe 4312 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 540 4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe 540 4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe 540 4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe 540 4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe 5088 winmngrsa.exe 5088 winmngrsa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 1092 dwm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5088 wrote to memory of 2648 5088 winmngrsa.exe 92 PID 5088 wrote to memory of 2648 5088 winmngrsa.exe 92 PID 5088 wrote to memory of 2648 5088 winmngrsa.exe 92 PID 5088 wrote to memory of 2648 5088 winmngrsa.exe 92 PID 5088 wrote to memory of 2648 5088 winmngrsa.exe 92 PID 5088 wrote to memory of 2648 5088 winmngrsa.exe 92 PID 5088 wrote to memory of 2648 5088 winmngrsa.exe 92 PID 5088 wrote to memory of 2648 5088 winmngrsa.exe 92 PID 5088 wrote to memory of 2648 5088 winmngrsa.exe 92 PID 5088 wrote to memory of 1092 5088 winmngrsa.exe 93 PID 5088 wrote to memory of 1092 5088 winmngrsa.exe 93 PID 5088 wrote to memory of 1092 5088 winmngrsa.exe 93 PID 5088 wrote to memory of 1092 5088 winmngrsa.exe 93 PID 5088 wrote to memory of 1092 5088 winmngrsa.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe"C:\Users\Admin\AppData\Local\Temp\4b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:540 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WinMngr"2⤵
- Launches sc.exe
PID:4312
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WinMngr" binpath= "C:\ProgramData\WinMngr\winmngrsa.exe" start= "auto"2⤵
- Launches sc.exe
PID:3936
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:1636
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WinMngr"2⤵
- Launches sc.exe
PID:3588
-
-
C:\ProgramData\WinMngr\winmngrsa.exeC:\ProgramData\WinMngr\winmngrsa.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2648
-
-
C:\Windows\system32\dwm.exedwm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5b4a802912838add056fb0aca7ee3a835
SHA16c113b8a01c74594597ae873d12cd88fe2de789e
SHA2564b8f652ca183784f370a57243e127fe7e6bfec64bab0f364780f88db00179488
SHA5121b2bfe779d7d16f1349311cab87f564853f70e43de618aabbf75a12a87def3262c3fb5b09533b15881589b98f4bb7fa8886db004e5f2bd0e960cbe87c08c653b