Analysis

  • max time kernel
    120s
  • max time network
    116s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 15:47

General

  • Target

    e62f10e317a9ff713ced832003a3ddc6ed586c742a929e745cbbf5ebfcd6a96bN.exe

  • Size

    1.8MB

  • MD5

    87afdc6e4189d9c282dc2cef16489b20

  • SHA1

    12adfc719b99ca188efee3ba9cd9738ed35efcd3

  • SHA256

    e62f10e317a9ff713ced832003a3ddc6ed586c742a929e745cbbf5ebfcd6a96b

  • SHA512

    d1f90bf060b8cf8e9d902e53158e63a03a6e613a3247312fb7d891d5695ab4047115f7bd11709b253b89ecd4f9224e3558172caaf910fd68a5b65641932df06f

  • SSDEEP

    49152:v1NgdUZonOk+9wqzOCN6OEOIUlNIiOkk6baID2rd0f:d6KkBCk6zlNIG95yWf

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e62f10e317a9ff713ced832003a3ddc6ed586c742a929e745cbbf5ebfcd6a96bN.exe
    "C:\Users\Admin\AppData\Local\Temp\e62f10e317a9ff713ced832003a3ddc6ed586c742a929e745cbbf5ebfcd6a96bN.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /Create /SC MINUTE /MO 1 /TN "MicrosoftEdgeUpdateTaskMachineCoreTask" /TR "C:\ProgramData\WinUpdate32\Updater.exe" /RL HIGHEST /F
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2896
    • C:\Windows\system32\cmd.exe
      cmd.exe /c timeout /t 5 /nobreak >nul & del "C:\Users\Admin\AppData\Local\Temp\e62f10e317a9ff713ced832003a3ddc6ed586c742a929e745cbbf5ebfcd6a96bN.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Windows\system32\timeout.exe
        timeout /t 5 /nobreak
        3⤵
        • Delays execution with timeout.exe
        PID:2224
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {EFDDAEB0-E918-4199-B3E9-CA37C4D85D0A} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\ProgramData\WinUpdate32\Updater.exe
      C:\ProgramData\WinUpdate32\Updater.exe
      2⤵
      • Downloads MZ/PE file
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Users\Admin\AppData\Roaming\Microsoft\UpdateTaskManager.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\UpdateTaskManager.exe" -a rx/0 -o xmr-eu1.nanopool.org:10343 -u 48EzR9SzuqGf2S1gXVTkpEDrEhZ6WpJX3KKsG6ZxMi447nkY7LQeN4p7Ye13tkw7G3KGDKp5Q3C47ZUsQpsSXzA27tT3z82.WORKER1 -p WORKER1 --threads=4 --cpu-priority=0 --tls
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\WinUpdate32\Updater.exe

    Filesize

    1.8MB

    MD5

    87afdc6e4189d9c282dc2cef16489b20

    SHA1

    12adfc719b99ca188efee3ba9cd9738ed35efcd3

    SHA256

    e62f10e317a9ff713ced832003a3ddc6ed586c742a929e745cbbf5ebfcd6a96b

    SHA512

    d1f90bf060b8cf8e9d902e53158e63a03a6e613a3247312fb7d891d5695ab4047115f7bd11709b253b89ecd4f9224e3558172caaf910fd68a5b65641932df06f

  • \Users\Admin\AppData\Roaming\Microsoft\UpdateTaskManager.exe

    Filesize

    5.3MB

    MD5

    0b6c036c7e331ac1580b1c6e8b89e92f

    SHA1

    c2e43e4ed7322aea501c58030eabb9c358afa5db

    SHA256

    91bb6ef6bb9a99d6120ba4ce41712764874476af7c1c49d087940a972078ac08

    SHA512

    72cf27688da48b95fe51e9dfdee985821e344c87144932010b143eb377c7eb3823610be3cac95c9984fbf0d7598da6f6d7a1ce02b046c34081478b726fdfe5fc

  • memory/2024-0-0x0000000140000000-0x00000001401C8000-memory.dmp

    Filesize

    1.8MB

  • memory/2552-24-0x0000000000390000-0x0000000000433000-memory.dmp

    Filesize

    652KB

  • memory/2552-28-0x0000000000100000-0x0000000000120000-memory.dmp

    Filesize

    128KB

  • memory/2552-31-0x000000013FCB0000-0x000000014049C000-memory.dmp

    Filesize

    7.9MB

  • memory/2812-5-0x0000000140000000-0x00000001401C8000-memory.dmp

    Filesize

    1.8MB

  • memory/2812-16-0x0000000003480000-0x0000000003C6C000-memory.dmp

    Filesize

    7.9MB

  • memory/2812-15-0x0000000003480000-0x0000000003C6C000-memory.dmp

    Filesize

    7.9MB

  • memory/2812-29-0x0000000003480000-0x0000000003C6C000-memory.dmp

    Filesize

    7.9MB