Edit tour
Windows
Analysis Report
test2.exe
Overview
General Information
Detection
Xmrig
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop multiple services
Yara detected Xmrig cryptocurrency miner
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Protects its processes via BreakOnTermination flag
Sample is not signed and drops a device driver
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Stops critical windows services
Suspicious powershell command line found
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Abnormal high CPU Usage
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Deletes files inside the Windows folder
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64native
- test2.exe (PID: 6296 cmdline:
"C:\Users\ user\Deskt op\test2.e xe" MD5: 80B97CC01243BE6495F5DF52BCDD6BDF) - dialer.exe (PID: 1444 cmdline:
C:\Windows \System32\ dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93) - winlogon.exe (PID: 888 cmdline:
winlogon.e xe MD5: A987B43E6A8E8F894B98A3DF022DB518) - lsass.exe (PID: 952 cmdline:
C:\Windows \system32\ lsass.exe MD5: 15A556DEF233F112D127025AB51AC2D3) - svchost.exe (PID: 1120 cmdline:
C:\Windows \system32\ svchost.ex e -k DcomL aunch -p - s LSM MD5: F586835082F632DC8D9404D83BC16316) - dwm.exe (PID: 1192 cmdline:
"dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C) - svchost.exe (PID: 1264 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s g psvc MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1304 cmdline:
C:\Windows \System32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s lmhosts MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1344 cmdline:
C:\Windows \System32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s NcbService MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1352 cmdline:
C:\Windows \system32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s TimeBroke rSvc MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1424 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s S chedule MD5: F586835082F632DC8D9404D83BC16316) - IntelCpHDCPSvc.exe (PID: 1464 cmdline:
C:\Windows \System32\ DriverStor e\FileRepo sitory\iig d_dch.inf_ amd64_3ea7 56ac68d34d 21\IntelCp HDCPSvc.ex e MD5: B6BAD2BD8596D9101874E9042B8E2D63) - svchost.exe (PID: 1472 cmdline:
C:\Windows \system32\ svchost.ex e -k Local Service -p -s EventS ystem MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1572 cmdline:
C:\Windows \System32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s EventLog MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1644 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s P rofSvc MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1700 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s S ENS MD5: F586835082F632DC8D9404D83BC16316) - IntelCpHeciSvc.exe (PID: 1760 cmdline:
C:\Windows \System32\ DriverStor e\FileRepo sitory\iig d_dch.inf_ amd64_3ea7 56ac68d34d 21\IntelCp HeciSvc.ex e MD5: 3B0DF35583675DE5A08E8D4C1271CEC0) - igfxCUIService.exe (PID: 1796 cmdline:
C:\Windows \System32\ DriverStor e\FileRepo sitory\cui _dch.inf_a md64_2e49f 48165b8de1 0\igfxCUIS ervice.exe MD5: 91038D45A86B5465E8B7E5CD63187150) - svchost.exe (PID: 1856 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s U serManager MD5: F586835082F632DC8D9404D83BC16316)
- powershell.exe (PID: 2904 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe Ad d-MpPrefer ence -Excl usionPath @($env:Use rProfile, $env:Progr amFiles) - Force MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7384 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
- cmd.exe (PID: 7468 cmdline:
C:\Windows \System32\ cmd.exe /c sc stop U soSvc & sc stop WaaS MedicSvc & sc stop w uauserv & sc stop bi ts & sc st op dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 3252 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - sc.exe (PID: 5424 cmdline:
sc stop Us oSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 4700 cmdline:
sc stop Wa aSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 2728 cmdline:
sc stop wu auserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 8012 cmdline:
sc stop bi ts MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 3128 cmdline:
sc stop do svc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
- cmd.exe (PID: 6828 cmdline:
C:\Windows \System32\ cmd.exe /c powercfg /x -hibern ate-timeou t-ac 0 & p owercfg /x -hibernat e-timeout- dc 0 & pow ercfg /x - standby-ti meout-ac 0 & powercf g /x -stan dby-timeou t-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6984 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - powercfg.exe (PID: 832 cmdline:
powercfg / x -hiberna te-timeout -ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 920 cmdline:
powercfg / x -hiberna te-timeout -dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 2596 cmdline:
powercfg / x -standby -timeout-a c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 3188 cmdline:
powercfg / x -standby -timeout-d c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
- powershell.exe (PID: 7772 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe <# yaqvbk#> I F([System. Environmen t]::OSVers ion.Versio n -lt [Sys tem.Versio n]"6.2") { schtasks /create /f /sc onlog on /rl hig hest /ru ' System' /t n 'GoogleU pdateTaskM achineQC' /tr '''C:\ Program Fi les\Google \Chrome\up dater.exe' '' } Else { Register -Scheduled Task -Acti on (New-Sc heduledTas kAction -E xecute 'C: \Program F iles\Googl e\Chrome\u pdater.exe ') -Trigge r (New-Sch eduledTask Trigger -A tStartup) -Settings (New-Sched uledTaskSe ttingsSet -AllowStar tIfOnBatte ries -Disa llowHardTe rminate -D ontStopIfG oingOnBatt eries -Don tStopOnIdl eEnd -Exec utionTimeL imit (New- TimeSpan - Days 1000) ) -TaskNam e 'GoogleU pdateTaskM achineQC' -User 'Sys tem' -RunL evel 'High est' -Forc e; } MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6672 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
- updater.exe (PID: 5708 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\updater. exe" MD5: 80B97CC01243BE6495F5DF52BCDD6BDF) - dialer.exe (PID: 5060 cmdline:
C:\Windows \System32\ dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93) - powershell.exe (PID: 5080 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe <# yaqvbk#> I F([System. Environmen t]::OSVers ion.Versio n -lt [Sys tem.Versio n]"6.2") { schtasks /create /f /sc onlog on /rl hig hest /ru ' System' /t n 'GoogleU pdateTaskM achineQC' /tr '''C:\ Program Fi les\Google \Chrome\up dater.exe' '' } Else { Register -Scheduled Task -Acti on (New-Sc heduledTas kAction -E xecute 'C: \Program F iles\Googl e\Chrome\u pdater.exe ') -Trigge r (New-Sch eduledTask Trigger -A tStartup) -Settings (New-Sched uledTaskSe ttingsSet -AllowStar tIfOnBatte ries -Disa llowHardTe rminate -D ontStopIfG oingOnBatt eries -Don tStopOnIdl eEnd -Exec utionTimeL imit (New- TimeSpan - Days 1000) ) -TaskNam e 'GoogleU pdateTaskM achineQC' -User 'Sys tem' -RunL evel 'High est' -Forc e; } MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5152 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
- powershell.exe (PID: 4756 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe Ad d-MpPrefer ence -Excl usionPath @($env:Use rProfile, $env:Progr amFiles) - Force MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8080 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
- cmd.exe (PID: 832 cmdline:
C:\Windows \System32\ cmd.exe /c sc stop U soSvc & sc stop WaaS MedicSvc & sc stop w uauserv & sc stop bi ts & sc st op dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6500 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - sc.exe (PID: 3188 cmdline:
sc stop Us oSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 2200 cmdline:
sc stop Wa aSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 6984 cmdline:
sc stop wu auserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 6880 cmdline:
sc stop bi ts MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 4752 cmdline:
sc stop do svc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
- cmd.exe (PID: 5936 cmdline:
C:\Windows \System32\ cmd.exe /c powercfg /x -hibern ate-timeou t-ac 0 & p owercfg /x -hibernat e-timeout- dc 0 & pow ercfg /x - standby-ti meout-ac 0 & powercf g /x -stan dby-timeou t-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1184 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - powercfg.exe (PID: 2404 cmdline:
powercfg / x -hiberna te-timeout -ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 6892 cmdline:
powercfg / x -hiberna te-timeout -dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
MALWARE_Win_CoinMiner02 | Detects coinmining malware | ditekSHen |
| |
MAL_XMR_Miner_May19_1 | Detects Monero Crypto Coin Miner | Florian Roth |
| |
MacOS_Cryptominer_Xmrig_241780a1 | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
MacOS_Cryptominer_Xmrig_241780a1 | unknown | unknown |
|
Operating System Destruction |
---|
Source: | Author: Joe Security: |
System Summary |
---|
Source: | Author: Jonathan Cheong, oscd.community: |