Malware Analysis Report

2025-08-05 15:06

Sample ID 250519-r53zhsal5s
Target 2025-05-19_ac8c5bb28609e1707bfb46cb3547a01b_coinminer_polyvice
SHA256 9cc7f38b240a650bd4edddbbbb8abaf43b6ba62821b37893226bd75fcc969749
Tags
ransomware spyware stealer
score
9/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V16

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
9/10

SHA256

9cc7f38b240a650bd4edddbbbb8abaf43b6ba62821b37893226bd75fcc969749

Threat Level: Likely malicious

The file 2025-05-19_ac8c5bb28609e1707bfb46cb3547a01b_coinminer_polyvice was found to be: Likely malicious.

Malicious Activity Summary

ransomware spyware stealer

Renames multiple (560) files with added filename extension

Reads user/profile data of web browsers

Sets desktop wallpaper using registry

Unsigned PE

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-05-19 14:47

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-05-19 14:47

Reported

2025-05-19 14:50

Platform

win10v2004-20250502-en

Max time kernel

103s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2025-05-19_ac8c5bb28609e1707bfb46cb3547a01b_coinminer_polyvice.exe"

Signatures

Renames multiple (560) files with added filename extension

ransomware

Reads user/profile data of web browsers

spyware stealer

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3951986358-4006919840-1009690842-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\wallpaper_temp_544.png" C:\Users\Admin\AppData\Local\Temp\2025-05-19_ac8c5bb28609e1707bfb46cb3547a01b_coinminer_polyvice.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2025-05-19_ac8c5bb28609e1707bfb46cb3547a01b_coinminer_polyvice.exe

"C:\Users\Admin\AppData\Local\Temp\2025-05-19_ac8c5bb28609e1707bfb46cb3547a01b_coinminer_polyvice.exe"

Network

Country Destination Domain Proto
ES 23.62.180.198:443 www.bing.com tcp
ES 23.62.180.198:443 www.bing.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
GB 216.58.201.99:80 c.pki.goog tcp

Files

C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133906695899785085.txt.enc

MD5 f5f1b71836699c95465fdbf895140f6e
SHA1 98f06d7f24265ff06fbdc9caef9ab4394fed0217
SHA256 2e3d1a9c16a101547e0131d58ed162ec224566c163159adb32b0a455dd0c0db7
SHA512 8ba717e77a0eb2dd3b915e8652888173f3ebbdea952be8fa31e89ea8b0b23bbfef97443685ce4ac4a1b68359c9dab636f34cf1c39241db38f0822a7a18e582ae

C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133906697109550709.txt.enc

MD5 bd89637dff7ffa0d1b62011ca645488a
SHA1 795d90a7719d7a7634f46de6052ec002ca9add8e
SHA256 64b095762b5dc79a79178b3f81ea160d35a49c2cee29aa9b4cac81e94b6cbc3c
SHA512 8581d6094d3d34d1a7647cee6e5377d9d1a8171211524f30ea35cf23e3faaaf7f926ffea0d85e477e103a5795557ca905af103e94c317925ce7385841bfd04c6

C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133906704604346632.txt.enc

MD5 953fc185b882fca4cf16aeb4a6e09d05
SHA1 bdb8d0606a77147a5789675419b53d2f1220a445
SHA256 67d6d40ed9f014c71e6a84957b8dbf79213362b3f43aaebf2898be9f8800d876
SHA512 877aad864e0faf81bd7bded0d192588932b6b1dbc39561a45783c3ce50d65d6c48486d4caa2bfd4a14af6681d29580c52148999b4cdb34e794348452424052b5

memory/544-561-0x00007FF781DB0000-0x00007FF7821C5000-memory.dmp