Overview
overview
10Static
static
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
10rihuata-ma...la.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.pdf
windows10-ltsc_2021-x64
3rihuata-ma...gh.exe
windows10-ltsc_2021-x64
10rihuata-ma...er.exe
windows10-ltsc_2021-x64
7rihuata-ma...er.exe
windows10-ltsc_2021-x64
8rihuata-ma...er.exe
windows10-ltsc_2021-x64
7rihuata-ma...ee.exe
windows10-ltsc_2021-x64
8rihuata-ma...pa.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
rihuata-ma...ii.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
7rihuata-ma...lu.exe
windows10-ltsc_2021-x64
10rihuata-ma...ad.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
10rihuata-ma...rs.exe
windows10-ltsc_2021-x64
8rihuata-ma...wa.exe
windows10-ltsc_2021-x64
10rihuata-ma...ad.exe
windows10-ltsc_2021-x64
10rihuata-ma...ad.exe
windows10-ltsc_2021-x64
10rihuata-ma...ix.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...wd.exe
windows10-ltsc_2021-x64
10rihuata-ma...ee.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...wa.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...ka.exe
windows10-ltsc_2021-x64
7rihuata-ma...da.exe
windows10-ltsc_2021-x64
10rihuata-ma...de.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
05/04/2025, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
rihuata-main/bomepratiaosa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
rihuata-main/bvrtiawdktgawdlla.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
rihuata-main/filesaa.pdf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
rihuata-main/gopawdkrjgh.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral5
Sample
rihuata-main/gramiltter.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
rihuata-main/huilter.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
rihuata-main/jaconfager.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral8
Sample
rihuata-main/kalrtotypadjeee.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
rihuata-main/kilapopa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
rihuata-main/klamingosa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
rihuata-main/kloalersaniii.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral12
Sample
rihuata-main/kukurumalasa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
rihuata-main/lotuserkasasa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral14
Sample
rihuata-main/lukarakalu.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
rihuata-main/mbnorad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral16
Sample
rihuata-main/mimamopetuesa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral17
Sample
rihuata-main/mumirolepawers.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral18
Sample
rihuata-main/nbitoadkrtjkajdwa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral19
Sample
rihuata-main/nborepadiktad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
rihuata-main/nenruioepad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral21
Sample
rihuata-main/nixmixhix.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral22
Sample
rihuata-main/nopekapeaaa.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral23
Sample
rihuata-main/nvpwadkkthaaaa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral24
Sample
rihuata-main/nvtipoawdkthawd.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral25
Sample
rihuata-main/oplaserkanureee.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral26
Sample
rihuata-main/oprlalalalklaaa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral27
Sample
rihuata-main/ripapakalswa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral28
Sample
rihuata-main/tiawdkthawdaaa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral29
Sample
rihuata-main/vjtkadkrihgka.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral30
Sample
rihuata-main/wkerkadlrgiajda.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral31
Sample
rihuata-main/zuyokhrfhhfde.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
rihuata-main/nixmixhix.exe
-
Size
12.5MB
-
MD5
4d9728a6c062cfa93ec0e5b18f67f436
-
SHA1
bcf5dc9253e785c561261ccefd3b0485adaa3748
-
SHA256
77af16a3bb1d762ceee56acc22bdf10d1945c007a4ecf6504e991f8f4e1588e9
-
SHA512
74ea12d3537c4d520296193c9bf481a367fa382ad1d131c9d67b048911f79cfd01325da17a6eb9d88048e63b10b2bb23db98c082a68ad81d3b74576302e92537
-
SSDEEP
393216:FMMj6uIhwiF20XBou0GmG/pUTfNF88FH8vmg2b5:CgbIBF2IaCpUTfNF8qH8vLw5
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 14 IoCs
resource yara_rule behavioral21/memory/5864-13-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-19-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-18-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-24-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-26-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-27-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-25-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-23-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-21-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-16-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-17-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-14-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-15-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral21/memory/5864-12-0x0000000140000000-0x000000014082C000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Stops running service(s) 4 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 5392 helper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 43 pastebin.com 44 pastebin.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5392 set thread context of 1808 5392 helper.exe 99 PID 5392 set thread context of 5864 5392 helper.exe 100 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3056 sc.exe 3492 sc.exe 2068 sc.exe 5896 sc.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2140 nixmixhix.exe 2140 nixmixhix.exe 2140 nixmixhix.exe 2140 nixmixhix.exe 5392 helper.exe 5392 helper.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe 5864 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 5864 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5392 wrote to memory of 1808 5392 helper.exe 99 PID 5392 wrote to memory of 1808 5392 helper.exe 99 PID 5392 wrote to memory of 1808 5392 helper.exe 99 PID 5392 wrote to memory of 1808 5392 helper.exe 99 PID 5392 wrote to memory of 1808 5392 helper.exe 99 PID 5392 wrote to memory of 1808 5392 helper.exe 99 PID 5392 wrote to memory of 1808 5392 helper.exe 99 PID 5392 wrote to memory of 1808 5392 helper.exe 99 PID 5392 wrote to memory of 1808 5392 helper.exe 99 PID 5392 wrote to memory of 5864 5392 helper.exe 100 PID 5392 wrote to memory of 5864 5392 helper.exe 100 PID 5392 wrote to memory of 5864 5392 helper.exe 100 PID 5392 wrote to memory of 5864 5392 helper.exe 100 PID 5392 wrote to memory of 5864 5392 helper.exe 100 PID 5392 wrote to memory of 5864 5392 helper.exe 100 PID 5392 wrote to memory of 5864 5392 helper.exe 100 PID 5392 wrote to memory of 5864 5392 helper.exe 100 PID 5392 wrote to memory of 5864 5392 helper.exe 100 PID 5392 wrote to memory of 5864 5392 helper.exe 100 PID 5392 wrote to memory of 5864 5392 helper.exe 100 PID 5392 wrote to memory of 5864 5392 helper.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\rihuata-main\nixmixhix.exe"C:\Users\Admin\AppData\Local\Temp\rihuata-main\nixmixhix.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Helper"2⤵
- Launches sc.exe
PID:3056
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Helper" binpath= "C:\ProgramData\Google\Chrome\helper.exe" start= "auto"2⤵
- Launches sc.exe
PID:3492
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2068
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Helper"2⤵
- Launches sc.exe
PID:5896
-
-
C:\ProgramData\Google\Chrome\helper.exeC:\ProgramData\Google\Chrome\helper.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5392 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1808
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.5MB
MD54d9728a6c062cfa93ec0e5b18f67f436
SHA1bcf5dc9253e785c561261ccefd3b0485adaa3748
SHA25677af16a3bb1d762ceee56acc22bdf10d1945c007a4ecf6504e991f8f4e1588e9
SHA51274ea12d3537c4d520296193c9bf481a367fa382ad1d131c9d67b048911f79cfd01325da17a6eb9d88048e63b10b2bb23db98c082a68ad81d3b74576302e92537