Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 17:40

General

  • Target

    39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe

  • Size

    1.6MB

  • MD5

    5a11bd589ed385b948998d9a9ee112ac

  • SHA1

    7a079b9d4fcb5ff29bb465f9c612325ca4fee918

  • SHA256

    39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113

  • SHA512

    1fcfbb528afcc17ac39e9af4ee9203258dd9d280bc19b08d1a0dc0d1d39ec56abab26d5c44e5a0c2847596bfc337c96a12f33ad6d410551a055e226b08ea26a7

  • SSDEEP

    24576:YBeB6u8s5VIf7Ab1wgDVh5NbfgGIblGQaGAVzMcPpef9J61YXmjzGHHrs90LeR0G:Yts5V5bSIh5Robl+Gd6pzGg90o0Tic0z

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 12 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe
    "C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3344
    • C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe
      "C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"
      2⤵
        PID:3496
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 404
          3⤵
          • Program crash
          PID:2720
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zbe2025328174019338.bat" "
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Windows\SysWOW64\schtasks.exe
          Schtasks.EXE /delete /tn "Maintenance" /f
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4452
        • C:\Windows\SysWOW64\schtasks.exe
          Schtasks.EXE /create /tn "Maintenance" /xml "C:\Users\Admin\AppData\Local\Temp\zx2025328174019338.xml"
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:216
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zb2025328174019338.bat" "
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Windows\SysWOW64\chcp.com
          chcp 1251
          3⤵
          • System Location Discovery: System Language Discovery
          PID:5396
        • C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe
          "C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5856
          • C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe
            "C:\Users\Admin\AppData\Local\Temp\39d49dd87075785ac6f007e5a006d08df57b225a8edb46417e56d0d8c4141113.exe"
            4⤵
            • Executes dropped EXE
            PID:5204
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5204 -s 404
              5⤵
              • Program crash
              PID:1540
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zbe2025328174019963.bat" "
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1740
            • C:\Windows\SysWOW64\schtasks.exe
              Schtasks.EXE /delete /tn "Maintenance" /f
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4800
            • C:\Windows\SysWOW64\schtasks.exe
              Schtasks.EXE /create /tn "Maintenance" /xml "C:\Users\Admin\AppData\Local\Temp\zx2025328174019963.xml"
              5⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:4916
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zb2025328174019963.bat" "
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4436
            • C:\Windows\SysWOW64\chcp.com
              chcp 1251
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4836
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 3 /nobreak
              5⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:5248
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 3 /nobreak
          3⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:1928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3496 -ip 3496
      1⤵
        PID:3432
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5204 -ip 5204
        1⤵
          PID:5500
        • C:\Users\Admin\AppData\Roaming\Maintenance\apps\maintenance.exe
          C:\Users\Admin\AppData\Roaming\Maintenance\apps\maintenance.exe
          1⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1096
          • C:\Users\Admin\AppData\Local\Temp\7171647a667973668888209082523340800\idle_maintenance.exe
            C:\Users\Admin\AppData\Local\Temp\7171647a667973668888209082523340800\idle_maintenance.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:5488

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7171647a667973668888209082523340800\config.json

          Filesize

          907B

          MD5

          43c4f8831c0f8cd4a1bace12c9cf55d6

          SHA1

          109f26e13576783eed3c9bcabd63e4758385be4c

          SHA256

          4dbcc0c88b85bb7c2d53a1eab1845ac469ea1aae28ede07a7040e154944a48a3

          SHA512

          16ec91b16593b63530ab98eff89427401dec9a0c68feb054aa61ade73623678a0b402ab6d6d5516e8a7ba3c2d519bab59d39b555dc283d86217a7780593e969b

        • C:\Users\Admin\AppData\Local\Temp\7171647a667973668888209082523340800\idle_maintenance.exe

          Filesize

          1.0MB

          MD5

          35fadb783458c2c49f06ac6991362ec1

          SHA1

          5d8a08ddf30df09f90613a5998b6106166ae81f5

          SHA256

          56141544ac6d03565909b3043fab104bf40cadb32d53a12d821e1328bc50f087

          SHA512

          abf028a19f1078f41c76eb0b5bc389c4d94f784c497436691e1933a87919fa7589945437fa95a656770ccd29aec328ab5349c6fc7dfd8731fc4c927538f6921f

        • C:\Users\Admin\AppData\Local\Temp\zb2025328174019338.bat

          Filesize

          760B

          MD5

          0bd7c9681da3230b5ccb3a9d878f20eb

          SHA1

          5ec77aa370e3b40bd2c08ceb257bd21df0dbbf32

          SHA256

          924abc2efa3e09891e74639eb33fe943a1073ec5a9529dc086f7bb23f9ff5dd1

          SHA512

          fc8d17515d977ee26d4dbd76ca88e1a93ac16e09e713c89094c6e494b9011751c22d663fee5321794f975e9474e43ac0fa9cf320e9569affbfec2723e6e0c9a5

        • C:\Users\Admin\AppData\Local\Temp\zb2025328174019963.bat

          Filesize

          760B

          MD5

          e6cd80a8dbf0951703e3638e6d7977a6

          SHA1

          f4a3f804b1a9ed93316fcce59241b1b213a884ac

          SHA256

          bf8828754e30cc6cd5a083d16758ccf65f31c678bf63cdc1725bde78c43576e9

          SHA512

          9d070393aa21cbcb6ebe08622b2ce5fc3e55ad44d84a8ea991c5fb9da26da0f6f2b858ed6c1b9aa469f39da4a348561dc255edf7ff0d3672645bb1ef2b214168

        • C:\Users\Admin\AppData\Local\Temp\zbe2025328174019338.bat

          Filesize

          200B

          MD5

          965769b2abd6da2037acf86b0a7c414c

          SHA1

          2d9bb2dc8df9d00c402b2b434c39e579b5f09e0b

          SHA256

          730bd5c1f887aac612a738c59c4ca026a7267d47e46cbc60e3a2554e29dbd631

          SHA512

          80621823ae30075913123795f26e6bffbcfb9c2dfbb6185516e591e9394b7196d98010ea63e51a2494433ee733f5a9232ebb1d5dbb18f0086e7020cdaca85ea0

        • C:\Users\Admin\AppData\Local\Temp\zbe2025328174019963.bat

          Filesize

          200B

          MD5

          afb238bbb5cca2c318dd1dd11d5bc04b

          SHA1

          0e0bcd2562e06884b17aaf4002da63b7b8bd172a

          SHA256

          402d0e323154fb5ef44a69d658d4d10a14ee622cdab9dece20fedbc226b00dc3

          SHA512

          ee6d64b7c763b8db12becc691b5ea99b26f60dadc5f2633420b09154191840f45d644413e593dd98b7ce19e13cbe3151a4538e6d918983002cc0bd1ff9b6ef92

        • C:\Users\Admin\AppData\Local\Temp\ze2025328174019338.tmp

          Filesize

          1.6MB

          MD5

          766c20eb69bf68fa7208ef2e059afd12

          SHA1

          ac6f1c7878b7f83d79d2669f0c926d1c3af9184d

          SHA256

          2309ba150e52418d9dd6096e2691a043e4671d3621f8451e0335bb5f12d10b83

          SHA512

          95fa02926fcb1bd4f34f2c09865ab9d65c21899d3f00577fc46b106fcc76f19851e5330413a26570fd7ea177f1d26caa46d8fa0f51d1fbb888210dfc7f564ad5

        • C:\Users\Admin\AppData\Local\Temp\zx2025328174019338.xml

          Filesize

          1KB

          MD5

          cde6a2c956f0d8edfbc6a283e0a9a508

          SHA1

          a30da7ca7641d9d67a14b5a91cecf140c27a588e

          SHA256

          a598599e2d48faac3404dfa2735c2947aaccff617a23be5704c3ded366936187

          SHA512

          89cfd0f13eba8f86cddad5f13e845e2638a1206ced6a09a743616bf63fcf44c2bc6e1cc8c9c62af93549a6c30e61054ea8dfff3ad4639ec23b425c47a3356bf7

        • C:\Users\Admin\AppData\Roaming\Maintenance\apps\maintenance.exe

          Filesize

          1.5MB

          MD5

          825a4c73c2d49e9c21a760f97e395afe

          SHA1

          f54db10036dc277ea28e775e1a60de28a8973d25

          SHA256

          f73171c80545acfbe374303e8236614a074ffd34a433c5f74e159caad65933a1

          SHA512

          9de9b05c4357cd032a6358190ccd5d3ab80050b7f6730c2b4975a1aff0f0b01bb7fe5c001b9dc7f133c1252e8de3791c42cb75d4822f25d8b8cf475b76739a68

        • memory/5488-37-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/5488-36-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/5488-38-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/5488-41-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/5488-42-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/5488-43-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/5488-44-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/5488-45-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/5488-46-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/5488-47-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/5488-48-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB