Overview
overview
10Static
static
10frick-main/bil2.exe
windows10-ltsc_2021-x64
7frick-main/bil3.exe
windows10-ltsc_2021-x64
10frick-main...rw.exe
windows10-ltsc_2021-x64
8frick-main/first.exe
windows10-ltsc_2021-x64
10frick-main...ve.exe
windows10-ltsc_2021-x64
10frick-main...ix.exe
windows10-ltsc_2021-x64
10frick-main...rd.exe
windows10-ltsc_2021-x64
10frick-main...st.exe
windows10-ltsc_2021-x64
10frick-main...ur.exe
windows10-ltsc_2021-x64
10frick-main...wd.exe
windows10-ltsc_2021-x64
10frick-main/second.exe
windows10-ltsc_2021-x64
10Analysis
-
max time kernel
299s -
max time network
300s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250410-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250410-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
19/04/2025, 06:16
Behavioral task
behavioral1
Sample
frick-main/bil2.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral2
Sample
frick-main/bil3.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral3
Sample
frick-main/bilvarw.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
frick-main/first.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
frick-main/kecklowfive.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral6
Sample
frick-main/keepsix.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral7
Sample
frick-main/keepthird.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral8
Sample
frick-main/mineratowerst.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
frick-main/newfour.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
frick-main/nowiwkgtjawd.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
frick-main/kecklowfive.exe
-
Size
12.5MB
-
MD5
4d9728a6c062cfa93ec0e5b18f67f436
-
SHA1
bcf5dc9253e785c561261ccefd3b0485adaa3748
-
SHA256
77af16a3bb1d762ceee56acc22bdf10d1945c007a4ecf6504e991f8f4e1588e9
-
SHA512
74ea12d3537c4d520296193c9bf481a367fa382ad1d131c9d67b048911f79cfd01325da17a6eb9d88048e63b10b2bb23db98c082a68ad81d3b74576302e92537
-
SSDEEP
393216:FMMj6uIhwiF20XBou0GmG/pUTfNF88FH8vmg2b5:CgbIBF2IaCpUTfNF8qH8vLw5
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 16 IoCs
resource yara_rule behavioral5/memory/5280-15-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-12-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-14-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-18-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-19-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-23-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-24-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-27-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-26-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-25-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-21-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-17-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-16-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-13-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-29-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral5/memory/5280-30-0x0000000140000000-0x000000014082C000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Stops running service(s) 4 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3960 helper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 49 pastebin.com 50 pastebin.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3960 set thread context of 5160 3960 helper.exe 102 PID 3960 set thread context of 5280 3960 helper.exe 103 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2620 sc.exe 60 sc.exe 4052 sc.exe 3104 sc.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5108 kecklowfive.exe 5108 kecklowfive.exe 5108 kecklowfive.exe 5108 kecklowfive.exe 3960 helper.exe 3960 helper.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe 5280 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 5280 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3960 wrote to memory of 5160 3960 helper.exe 102 PID 3960 wrote to memory of 5160 3960 helper.exe 102 PID 3960 wrote to memory of 5160 3960 helper.exe 102 PID 3960 wrote to memory of 5160 3960 helper.exe 102 PID 3960 wrote to memory of 5160 3960 helper.exe 102 PID 3960 wrote to memory of 5160 3960 helper.exe 102 PID 3960 wrote to memory of 5160 3960 helper.exe 102 PID 3960 wrote to memory of 5160 3960 helper.exe 102 PID 3960 wrote to memory of 5160 3960 helper.exe 102 PID 3960 wrote to memory of 5280 3960 helper.exe 103 PID 3960 wrote to memory of 5280 3960 helper.exe 103 PID 3960 wrote to memory of 5280 3960 helper.exe 103 PID 3960 wrote to memory of 5280 3960 helper.exe 103 PID 3960 wrote to memory of 5280 3960 helper.exe 103 PID 3960 wrote to memory of 5280 3960 helper.exe 103 PID 3960 wrote to memory of 5280 3960 helper.exe 103 PID 3960 wrote to memory of 5280 3960 helper.exe 103 PID 3960 wrote to memory of 5280 3960 helper.exe 103 PID 3960 wrote to memory of 5280 3960 helper.exe 103 PID 3960 wrote to memory of 5280 3960 helper.exe 103 PID 3960 wrote to memory of 5280 3960 helper.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\frick-main\kecklowfive.exe"C:\Users\Admin\AppData\Local\Temp\frick-main\kecklowfive.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Helper"2⤵
- Launches sc.exe
PID:4052
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Helper" binpath= "C:\ProgramData\Google\Chrome\helper.exe" start= "auto"2⤵
- Launches sc.exe
PID:3104
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2620
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Helper"2⤵
- Launches sc.exe
PID:60
-
-
C:\ProgramData\Google\Chrome\helper.exeC:\ProgramData\Google\Chrome\helper.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:5160
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5280
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.5MB
MD54d9728a6c062cfa93ec0e5b18f67f436
SHA1bcf5dc9253e785c561261ccefd3b0485adaa3748
SHA25677af16a3bb1d762ceee56acc22bdf10d1945c007a4ecf6504e991f8f4e1588e9
SHA51274ea12d3537c4d520296193c9bf481a367fa382ad1d131c9d67b048911f79cfd01325da17a6eb9d88048e63b10b2bb23db98c082a68ad81d3b74576302e92537