Analysis
-
max time kernel
299s -
max time network
282s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/12/2024, 14:13
Static task
static1
General
-
Target
aaadri.exe
-
Size
2.5MB
-
MD5
9f36b71007f45e5798edb2a7c69a9173
-
SHA1
57ee352beacae902816516ab7d3a881e56fb456c
-
SHA256
1d2ee5ac64af7f3c1201f6819e460c03c65da6c81a7b69e3ae84bad9a1226cb5
-
SHA512
62dbec2107ff46536311d5937381f8181aba350b7f39cde586cecfa115243d40f1f7b71b8337403b179678e1bb4b6c2c27c1f749aa88f9c3c23efd063449813e
-
SSDEEP
49152:Uu2niGtF/++JGq24/Tz40hDqFSw1AXRuA08BgWrio3c13H6Lzw40zhY2L:vyiGtF/FAMTsIDhuy0KoXO2
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/3480-19-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3480-23-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3480-22-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3480-21-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3480-20-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3480-17-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3480-16-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3480-25-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3480-26-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2128 yhlcpcgmvvxx.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2128 set thread context of 2100 2128 yhlcpcgmvvxx.exe 86 PID 2128 set thread context of 3480 2128 yhlcpcgmvvxx.exe 87 -
resource yara_rule behavioral1/memory/3480-15-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-19-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-23-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-22-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-21-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-20-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-17-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-16-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-14-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-11-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-12-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-13-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-25-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3480-26-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2944 sc.exe 4444 sc.exe 4172 sc.exe 4184 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1192 aaadri.exe 1192 aaadri.exe 1192 aaadri.exe 1192 aaadri.exe 2128 yhlcpcgmvvxx.exe 2128 yhlcpcgmvvxx.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe 3480 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 3480 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2100 2128 yhlcpcgmvvxx.exe 86 PID 2128 wrote to memory of 2100 2128 yhlcpcgmvvxx.exe 86 PID 2128 wrote to memory of 2100 2128 yhlcpcgmvvxx.exe 86 PID 2128 wrote to memory of 2100 2128 yhlcpcgmvvxx.exe 86 PID 2128 wrote to memory of 2100 2128 yhlcpcgmvvxx.exe 86 PID 2128 wrote to memory of 2100 2128 yhlcpcgmvvxx.exe 86 PID 2128 wrote to memory of 2100 2128 yhlcpcgmvvxx.exe 86 PID 2128 wrote to memory of 2100 2128 yhlcpcgmvvxx.exe 86 PID 2128 wrote to memory of 2100 2128 yhlcpcgmvvxx.exe 86 PID 2128 wrote to memory of 3480 2128 yhlcpcgmvvxx.exe 87 PID 2128 wrote to memory of 3480 2128 yhlcpcgmvvxx.exe 87 PID 2128 wrote to memory of 3480 2128 yhlcpcgmvvxx.exe 87 PID 2128 wrote to memory of 3480 2128 yhlcpcgmvvxx.exe 87 PID 2128 wrote to memory of 3480 2128 yhlcpcgmvvxx.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaadri.exe"C:\Users\Admin\AppData\Local\Temp\aaadri.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RMVHEKXW"2⤵
- Launches sc.exe
PID:4444
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RMVHEKXW" binpath= "C:\ProgramData\vlvpbvfemslu\yhlcpcgmvvxx.exe" start= "auto"2⤵
- Launches sc.exe
PID:4172
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:4184
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "RMVHEKXW"2⤵
- Launches sc.exe
PID:2944
-
-
C:\ProgramData\vlvpbvfemslu\yhlcpcgmvvxx.exeC:\ProgramData\vlvpbvfemslu\yhlcpcgmvvxx.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2100
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD59f36b71007f45e5798edb2a7c69a9173
SHA157ee352beacae902816516ab7d3a881e56fb456c
SHA2561d2ee5ac64af7f3c1201f6819e460c03c65da6c81a7b69e3ae84bad9a1226cb5
SHA51262dbec2107ff46536311d5937381f8181aba350b7f39cde586cecfa115243d40f1f7b71b8337403b179678e1bb4b6c2c27c1f749aa88f9c3c23efd063449813e