Analysis
-
max time kernel
120s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/12/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
75c391fa684eaf67b853c3097c686bfb788e3b8195d16ef61ddaab10557221d6.exe
Resource
win7-20241010-en
General
-
Target
75c391fa684eaf67b853c3097c686bfb788e3b8195d16ef61ddaab10557221d6.exe
-
Size
2.4MB
-
MD5
59efa0fa2342651aadcef6296d61fd6c
-
SHA1
f0be0a96d27d08df1c531c3aed0527b03147617a
-
SHA256
75c391fa684eaf67b853c3097c686bfb788e3b8195d16ef61ddaab10557221d6
-
SHA512
a1984a8788e16dfacb806bdb1145b5619f4e743ff1701e5b755acc6a71945a922db91b9bd4694eee337561e91de654462c5019edf43b38b5409c5f2ffbfccf4a
-
SSDEEP
49152:7It2MHY5CN3cknRo0AzjuOShOI0czcvdJD3yT3xEnEAJsC:7IHskR5AjdmGcM7EGnvsC
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/files/0x00060000000193b8-26.dat family_xmrig behavioral1/files/0x00060000000193b8-26.dat xmrig -
Xmrig family
-
Executes dropped EXE 5 IoCs
pid Process 3064 nssm.exe 2804 nssm.exe 468 Process not Found 1240 nssm.exe 1276 xmrig.exe -
Loads dropped DLL 3 IoCs
pid Process 2956 cmd.exe 2956 cmd.exe 1240 nssm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75c391fa684eaf67b853c3097c686bfb788e3b8195d16ef61ddaab10557221d6.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 1276 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1276 xmrig.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2956 2892 75c391fa684eaf67b853c3097c686bfb788e3b8195d16ef61ddaab10557221d6.exe 30 PID 2892 wrote to memory of 2956 2892 75c391fa684eaf67b853c3097c686bfb788e3b8195d16ef61ddaab10557221d6.exe 30 PID 2892 wrote to memory of 2956 2892 75c391fa684eaf67b853c3097c686bfb788e3b8195d16ef61ddaab10557221d6.exe 30 PID 2892 wrote to memory of 2956 2892 75c391fa684eaf67b853c3097c686bfb788e3b8195d16ef61ddaab10557221d6.exe 30 PID 2956 wrote to memory of 3064 2956 cmd.exe 32 PID 2956 wrote to memory of 3064 2956 cmd.exe 32 PID 2956 wrote to memory of 3064 2956 cmd.exe 32 PID 2956 wrote to memory of 3064 2956 cmd.exe 32 PID 2956 wrote to memory of 2804 2956 cmd.exe 33 PID 2956 wrote to memory of 2804 2956 cmd.exe 33 PID 2956 wrote to memory of 2804 2956 cmd.exe 33 PID 2956 wrote to memory of 2804 2956 cmd.exe 33 PID 1240 wrote to memory of 1276 1240 nssm.exe 36 PID 1240 wrote to memory of 1276 1240 nssm.exe 36 PID 1240 wrote to memory of 1276 1240 nssm.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\75c391fa684eaf67b853c3097c686bfb788e3b8195d16ef61ddaab10557221d6.exe"C:\Users\Admin\AppData\Local\Temp\75c391fa684eaf67b853c3097c686bfb788e3b8195d16ef61ddaab10557221d6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Sunlogin_svc\start.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\Sunlogin_svc\nssm.exenssm install Sunlogin_svc xmrig.exe3⤵
- Executes dropped EXE
PID:3064
-
-
\??\c:\Sunlogin_svc\nssm.exenssm start Sunlogin_svc3⤵
- Executes dropped EXE
PID:2804
-
-
-
\??\c:\Sunlogin_svc\nssm.exec:\Sunlogin_svc\nssm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1240 -
\??\c:\Sunlogin_svc\xmrig.exe"xmrig.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5c5aa4d8fc861086d7d4ca18e3c344e53
SHA13c7f2c837712841a1c53561b8581b7c80f3db597
SHA25612a32ec5fc8ddf7b9cca0c2b9bfbd0f4c61c5629c81656546b0a6ce748937f5a
SHA512389911390c110cf1508fc226768835c45736899606fe7b847226f6b1d839be9854f09eadf9e4a6d8b5ef5d07297dfe09360284d3ba88eae93cbfbdfb08abdb02
-
Filesize
2KB
MD5843463aba84f6dd253ac9bf9a3973797
SHA18525330b2ce7ef45b7b37c6b8224ccc52d30e32f
SHA256038a081657cfbed3c07d3e9f1c80ea78abe0b25829172dba40c5b9bb663d2537
SHA512aa1cbcf45cd29d91940d85b385502380d96324f89ccd01d4c287e6d61523ca783e65e791bca9828ffe38a989d3e8bb85f446ddae86c230b697d31c24202bb04f
-
Filesize
323KB
MD5beceae2fdc4f7729a93e94ac2ccd78cc
SHA147c112c23c7bdf2af24a20bd512f91ff6af76bc6
SHA256f689ee9af94b00e9e3f0bb072b34caaf207f32dcb4f5782fc9ca351df9a06c97
SHA512073f5ae0d4ffedb5edb3b92b8e19bea2c482a3ad7ab02ed71955d3e55aa44a297307fe4334d28c6f7683cb02d40b4313e560c9049507b16a8c5d6ee0a0f0071f
-
Filesize
6.1MB
MD5f6d520ae125f03056c4646c508218d16
SHA1f65e63d14dd57eadb262deaa2b1a8a965a2a962c
SHA256d2fcf28897ddc2137141d838b734664ff7592e03fcd467a433a51cb4976b4fb1
SHA512d1ec3da141ce504993a0cbf8ea4b719ffa40a2be4941c18ffc64ec3f71435f7bddadda6032ec0ae6cada66226ee39a2012079ed318df389c7c6584ad3e1c334d