Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
28/12/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
Anon.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
Anon.exe
-
Size
2.5MB
-
MD5
5386009a6d3a5b6d5319e762171d2087
-
SHA1
15fec0959ccf8a0af9d3ab78d6e55bce21c01ca7
-
SHA256
c1511ec26e2925934136dee0990b65eec636d7a04b74aebc322dad2d412fddf5
-
SHA512
5e3becd443a886a2529eecf3dc2c775dd8cdca6093c847d72f64834f969661bbac0df8394c377995c3e6a652b046ef0acf813a7c82e42b62c2c985e894abb810
-
SSDEEP
49152:5Ye8M5M8q76YOAWkP2yIDEf3gO78FgUzc1yY+x9b9BKNznaO4MeFXP:5Ye3Kt76PAqRDEIO5Udb94NTaOu
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/3608-16-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3608-17-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3608-20-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3608-22-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3608-21-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3608-19-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3608-23-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3608-24-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2552 hajvmxuadqmp.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2552 set thread context of 2732 2552 hajvmxuadqmp.exe 109 PID 2552 set thread context of 3608 2552 hajvmxuadqmp.exe 110 -
resource yara_rule behavioral1/memory/3608-13-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-16-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-17-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-14-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-15-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-11-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-12-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-20-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-22-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-21-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-19-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-23-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3608-24-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3092 sc.exe 2396 sc.exe 3064 sc.exe 4784 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4612 Anon.exe 4612 Anon.exe 4612 Anon.exe 4612 Anon.exe 2552 hajvmxuadqmp.exe 2552 hajvmxuadqmp.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe 3608 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 3608 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2732 2552 hajvmxuadqmp.exe 109 PID 2552 wrote to memory of 2732 2552 hajvmxuadqmp.exe 109 PID 2552 wrote to memory of 2732 2552 hajvmxuadqmp.exe 109 PID 2552 wrote to memory of 2732 2552 hajvmxuadqmp.exe 109 PID 2552 wrote to memory of 2732 2552 hajvmxuadqmp.exe 109 PID 2552 wrote to memory of 2732 2552 hajvmxuadqmp.exe 109 PID 2552 wrote to memory of 2732 2552 hajvmxuadqmp.exe 109 PID 2552 wrote to memory of 2732 2552 hajvmxuadqmp.exe 109 PID 2552 wrote to memory of 2732 2552 hajvmxuadqmp.exe 109 PID 2552 wrote to memory of 3608 2552 hajvmxuadqmp.exe 110 PID 2552 wrote to memory of 3608 2552 hajvmxuadqmp.exe 110 PID 2552 wrote to memory of 3608 2552 hajvmxuadqmp.exe 110 PID 2552 wrote to memory of 3608 2552 hajvmxuadqmp.exe 110 PID 2552 wrote to memory of 3608 2552 hajvmxuadqmp.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anon.exe"C:\Users\Admin\AppData\Local\Temp\Anon.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "VGIRGBTS"2⤵
- Launches sc.exe
PID:3092
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "VGIRGBTS" binpath= "C:\ProgramData\kfiukjxzpfsj\hajvmxuadqmp.exe" start= "auto"2⤵
- Launches sc.exe
PID:2396
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:3064
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "VGIRGBTS"2⤵
- Launches sc.exe
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4144,i,15446853199651160304,16979033243148495184,262144 --variations-seed-version --mojo-platform-channel-handle=4552 /prefetch:81⤵PID:3792
-
C:\ProgramData\kfiukjxzpfsj\hajvmxuadqmp.exeC:\ProgramData\kfiukjxzpfsj\hajvmxuadqmp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2732
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=5308,i,15446853199651160304,16979033243148495184,262144 --variations-seed-version --mojo-platform-channel-handle=1308 /prefetch:81⤵PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD55386009a6d3a5b6d5319e762171d2087
SHA115fec0959ccf8a0af9d3ab78d6e55bce21c01ca7
SHA256c1511ec26e2925934136dee0990b65eec636d7a04b74aebc322dad2d412fddf5
SHA5125e3becd443a886a2529eecf3dc2c775dd8cdca6093c847d72f64834f969661bbac0df8394c377995c3e6a652b046ef0acf813a7c82e42b62c2c985e894abb810