Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe
Resource
win7-20241010-en
General
-
Target
39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe
-
Size
1.6MB
-
MD5
5a11bd589ed385b948998d9a9ee112ac
-
SHA1
7a079b9d4fcb5ff29bb465f9c612325ca4fee918
-
SHA256
39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113
-
SHA512
1fcfbb528afcc17ac39e9af4ee9203258dd9d280bc19b08d1a0dc0d1d39ec56abab26d5c44e5a0c2847596bfc337c96a12f33ad6d410551a055e226b08ea26a7
-
SSDEEP
24576:YBeB6u8s5VIf7Ab1wgDVh5NbfgGIblGQaGAVzMcPpef9J61YXmjzGHHrs90LeR0G:Yts5V5bSIh5Robl+Gd6pzGg90o0Tic0z
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/files/0x0007000000024249-34.dat xmrig behavioral2/memory/5488-36-0x0000000000400000-0x000000000050D000-memory.dmp xmrig behavioral2/memory/5488-37-0x0000000000400000-0x000000000050D000-memory.dmp xmrig behavioral2/memory/5488-38-0x0000000000400000-0x000000000050D000-memory.dmp xmrig behavioral2/memory/5488-41-0x0000000000400000-0x000000000050D000-memory.dmp xmrig behavioral2/memory/5488-42-0x0000000000400000-0x000000000050D000-memory.dmp xmrig behavioral2/memory/5488-43-0x0000000000400000-0x000000000050D000-memory.dmp xmrig behavioral2/memory/5488-44-0x0000000000400000-0x000000000050D000-memory.dmp xmrig behavioral2/memory/5488-45-0x0000000000400000-0x000000000050D000-memory.dmp xmrig behavioral2/memory/5488-46-0x0000000000400000-0x000000000050D000-memory.dmp xmrig behavioral2/memory/5488-47-0x0000000000400000-0x000000000050D000-memory.dmp xmrig behavioral2/memory/5488-48-0x0000000000400000-0x000000000050D000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation maintenance.exe -
Executes dropped EXE 4 IoCs
pid Process 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 5204 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 1096 maintenance.exe 5488 idle_maintenance.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3344 set thread context of 3496 3344 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 86 PID 5856 set thread context of 5204 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2720 3496 WerFault.exe 86 1540 5204 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language maintenance.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1928 timeout.exe 5248 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 216 schtasks.exe 4916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1096 maintenance.exe 1096 maintenance.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 5488 idle_maintenance.exe Token: SeLockMemoryPrivilege 5488 idle_maintenance.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 3344 wrote to memory of 3496 3344 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 86 PID 3344 wrote to memory of 3496 3344 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 86 PID 3344 wrote to memory of 3496 3344 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 86 PID 3344 wrote to memory of 3496 3344 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 86 PID 3344 wrote to memory of 1968 3344 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 90 PID 3344 wrote to memory of 1968 3344 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 90 PID 3344 wrote to memory of 1968 3344 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 90 PID 3344 wrote to memory of 2536 3344 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 92 PID 3344 wrote to memory of 2536 3344 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 92 PID 3344 wrote to memory of 2536 3344 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 92 PID 2536 wrote to memory of 5396 2536 cmd.exe 94 PID 2536 wrote to memory of 5396 2536 cmd.exe 94 PID 2536 wrote to memory of 5396 2536 cmd.exe 94 PID 1968 wrote to memory of 4452 1968 cmd.exe 95 PID 1968 wrote to memory of 4452 1968 cmd.exe 95 PID 1968 wrote to memory of 4452 1968 cmd.exe 95 PID 1968 wrote to memory of 216 1968 cmd.exe 96 PID 1968 wrote to memory of 216 1968 cmd.exe 96 PID 1968 wrote to memory of 216 1968 cmd.exe 96 PID 2536 wrote to memory of 5856 2536 cmd.exe 97 PID 2536 wrote to memory of 5856 2536 cmd.exe 97 PID 2536 wrote to memory of 5856 2536 cmd.exe 97 PID 2536 wrote to memory of 1928 2536 cmd.exe 98 PID 2536 wrote to memory of 1928 2536 cmd.exe 98 PID 2536 wrote to memory of 1928 2536 cmd.exe 98 PID 5856 wrote to memory of 5204 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 99 PID 5856 wrote to memory of 5204 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 99 PID 5856 wrote to memory of 5204 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 99 PID 5856 wrote to memory of 5204 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 99 PID 5856 wrote to memory of 1740 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 102 PID 5856 wrote to memory of 1740 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 102 PID 5856 wrote to memory of 1740 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 102 PID 5856 wrote to memory of 4436 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 104 PID 5856 wrote to memory of 4436 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 104 PID 5856 wrote to memory of 4436 5856 39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe 104 PID 1740 wrote to memory of 4800 1740 cmd.exe 106 PID 1740 wrote to memory of 4800 1740 cmd.exe 106 PID 1740 wrote to memory of 4800 1740 cmd.exe 106 PID 4436 wrote to memory of 4836 4436 cmd.exe 107 PID 4436 wrote to memory of 4836 4436 cmd.exe 107 PID 4436 wrote to memory of 4836 4436 cmd.exe 107 PID 1740 wrote to memory of 4916 1740 cmd.exe 108 PID 1740 wrote to memory of 4916 1740 cmd.exe 108 PID 1740 wrote to memory of 4916 1740 cmd.exe 108 PID 4436 wrote to memory of 5248 4436 cmd.exe 120 PID 4436 wrote to memory of 5248 4436 cmd.exe 120 PID 4436 wrote to memory of 5248 4436 cmd.exe 120 PID 1096 wrote to memory of 5488 1096 maintenance.exe 125 PID 1096 wrote to memory of 5488 1096 maintenance.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"2⤵PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 4043⤵
- Program crash
PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zbe2025328174019338.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\schtasks.exeSchtasks.EXE /delete /tn "Maintenance" /f3⤵
- System Location Discovery: System Language Discovery
PID:4452
-
-
C:\Windows\SysWOW64\schtasks.exeSchtasks.EXE /create /tn "Maintenance" /xml "C:\Users\Admin\AppData\Local\Temp\zx2025328174019338.xml"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zb2025328174019338.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵
- System Location Discovery: System Language Discovery
PID:5396
-
-
C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5856 -
C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"4⤵
- Executes dropped EXE
PID:5204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5204 -s 4045⤵
- Program crash
PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zbe2025328174019963.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\schtasks.exeSchtasks.EXE /delete /tn "Maintenance" /f5⤵
- System Location Discovery: System Language Discovery
PID:4800
-
-
C:\Windows\SysWOW64\schtasks.exeSchtasks.EXE /create /tn "Maintenance" /xml "C:\Users\Admin\AppData\Local\Temp\zx2025328174019963.xml"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zb2025328174019963.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\chcp.comchcp 12515⤵
- System Location Discovery: System Language Discovery
PID:4836
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak5⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5248
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3496 -ip 34961⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5204 -ip 52041⤵PID:5500
-
C:\Users\Admin\AppData\Roaming\Maintenance\apps\maintenance.exeC:\Users\Admin\AppData\Roaming\Maintenance\apps\maintenance.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\7171647a667973668888209082523340800\idle_maintenance.exeC:\Users\Admin\AppData\Local\Temp\7171647a667973668888209082523340800\idle_maintenance.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907B
MD543c4f8831c0f8cd4a1bace12c9cf55d6
SHA1109f26e13576783eed3c9bcabd63e4758385be4c
SHA2564dbcc0c88b85bb7c2d53a1eab1845ac469ea1aae28ede07a7040e154944a48a3
SHA51216ec91b16593b63530ab98eff89427401dec9a0c68feb054aa61ade73623678a0b402ab6d6d5516e8a7ba3c2d519bab59d39b555dc283d86217a7780593e969b
-
Filesize
1.0MB
MD535fadb783458c2c49f06ac6991362ec1
SHA15d8a08ddf30df09f90613a5998b6106166ae81f5
SHA25656141544ac6d03565909b3043fab104bf40cadb32d53a12d821e1328bc50f087
SHA512abf028a19f1078f41c76eb0b5bc389c4d94f784c497436691e1933a87919fa7589945437fa95a656770ccd29aec328ab5349c6fc7dfd8731fc4c927538f6921f
-
Filesize
760B
MD50bd7c9681da3230b5ccb3a9d878f20eb
SHA15ec77aa370e3b40bd2c08ceb257bd21df0dbbf32
SHA256924abc2efa3e09891e74639eb33fe943a1073ec5a9529dc086f7bb23f9ff5dd1
SHA512fc8d17515d977ee26d4dbd76ca88e1a93ac16e09e713c89094c6e494b9011751c22d663fee5321794f975e9474e43ac0fa9cf320e9569affbfec2723e6e0c9a5
-
Filesize
760B
MD5e6cd80a8dbf0951703e3638e6d7977a6
SHA1f4a3f804b1a9ed93316fcce59241b1b213a884ac
SHA256bf8828754e30cc6cd5a083d16758ccf65f31c678bf63cdc1725bde78c43576e9
SHA5129d070393aa21cbcb6ebe08622b2ce5fc3e55ad44d84a8ea991c5fb9da26da0f6f2b858ed6c1b9aa469f39da4a348561dc255edf7ff0d3672645bb1ef2b214168
-
Filesize
200B
MD5965769b2abd6da2037acf86b0a7c414c
SHA12d9bb2dc8df9d00c402b2b434c39e579b5f09e0b
SHA256730bd5c1f887aac612a738c59c4ca026a7267d47e46cbc60e3a2554e29dbd631
SHA51280621823ae30075913123795f26e6bffbcfb9c2dfbb6185516e591e9394b7196d98010ea63e51a2494433ee733f5a9232ebb1d5dbb18f0086e7020cdaca85ea0
-
Filesize
200B
MD5afb238bbb5cca2c318dd1dd11d5bc04b
SHA10e0bcd2562e06884b17aaf4002da63b7b8bd172a
SHA256402d0e323154fb5ef44a69d658d4d10a14ee622cdab9dece20fedbc226b00dc3
SHA512ee6d64b7c763b8db12becc691b5ea99b26f60dadc5f2633420b09154191840f45d644413e593dd98b7ce19e13cbe3151a4538e6d918983002cc0bd1ff9b6ef92
-
Filesize
1.6MB
MD5766c20eb69bf68fa7208ef2e059afd12
SHA1ac6f1c7878b7f83d79d2669f0c926d1c3af9184d
SHA2562309ba150e52418d9dd6096e2691a043e4671d3621f8451e0335bb5f12d10b83
SHA51295fa02926fcb1bd4f34f2c09865ab9d65c21899d3f00577fc46b106fcc76f19851e5330413a26570fd7ea177f1d26caa46d8fa0f51d1fbb888210dfc7f564ad5
-
Filesize
1KB
MD5cde6a2c956f0d8edfbc6a283e0a9a508
SHA1a30da7ca7641d9d67a14b5a91cecf140c27a588e
SHA256a598599e2d48faac3404dfa2735c2947aaccff617a23be5704c3ded366936187
SHA51289cfd0f13eba8f86cddad5f13e845e2638a1206ced6a09a743616bf63fcf44c2bc6e1cc8c9c62af93549a6c30e61054ea8dfff3ad4639ec23b425c47a3356bf7
-
Filesize
1.5MB
MD5825a4c73c2d49e9c21a760f97e395afe
SHA1f54db10036dc277ea28e775e1a60de28a8973d25
SHA256f73171c80545acfbe374303e8236614a074ffd34a433c5f74e159caad65933a1
SHA5129de9b05c4357cd032a6358190ccd5d3ab80050b7f6730c2b4975a1aff0f0b01bb7fe5c001b9dc7f133c1252e8de3791c42cb75d4822f25d8b8cf475b76739a68