Edit tour
Windows
Analysis Report
o9OIGsDt4m.exe
Overview
General Information
Detection
Xmrig
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Xmrig
Yara detected Xmrig cryptocurrency miner
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Bypasses PowerShell execution policy
Detected Stratum mining protocol
Encrypted powershell cmdline option found
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Potential Crypto Mining Activity
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected PersistenceViaHiddenTask
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Network Connection Initiated By AddinUtil.EXE
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Uncommon Child Process Of AddinUtil.EXE
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- o9OIGsDt4m.exe (PID: 6380 cmdline:
"C:\Users\ user\Deskt op\o9OIGsD t4m.exe" MD5: FD3AD0AE7FE1BBEE4B2F2BD43A359393)
- powershell.exe (PID: 2300 cmdline:
powershell .exe -Exec utionPolic y Bypass - WindowStyl e Hidden - NoProfile -enc QQBkA GQALQBNAHA AUAByAGUAZ gBlAHIAZQB uAGMAZQAgA C0ARQB4AGM AbAB1AHMAa QBvAG4AUAB hAHQAaAAgA EMAOgBcAFU AcwBlAHIAc wBcAGEAbAB mAG8AbgBzA FwAQQBwAHA ARABhAHQAY QBcAFIAbwB hAG0AaQBuA GcAXABBAHI AZwB1AG0AZ QBuAHQAQwB vAHUAbgB0A FwAQwB1AHI AcgBlAG4Ad AAuAGUAeAB lACwAQwA6A FwAVwBpAG4 AZABvAHcAc wBcAE0AaQB jAHIAbwBzA G8AZgB0AC4 ATgBFAFQAX ABGAHIAYQB tAGUAdwBvA HIAawA2ADQ AXAB2ADQAL gAwAC4AMwA wADMAMQA5A FwAQQBkAGQ ASQBuAFAAc gBvAGMAZQB zAHMALgBlA HgAZQAsAEM AOgBcAFUAc wBlAHIAcwB cAGEAbABmA G8AbgBzAFw AQQBwAHAAR ABhAHQAYQB cAEwAbwBjA GEAbABcAFQ AZQBtAHAAX AAgAC0ARgB vAHIAYwBlA DsAIABBAGQ AZAAtAE0Ac ABQAHIAZQB mAGUAcgBlA G4AYwBlACA ALQBFAHgAY wBsAHUAcwB pAG8AbgBQA HIAbwBjAGU AcwBzACAAQ wA6AFwAVwB pAG4AZABvA HcAcwBcAE0 AaQBjAHIAb wBzAG8AZgB 0AC4ATgBFA FQAXABGAHI AYQBtAGUAd wBvAHIAawA 2ADQAXAB2A DQALgAwAC4 AMwAwADMAM QA5AFwAQQB kAGQASQBuA FAAcgBvAGM AZQBzAHMAL gBlAHgAZQA sAEMAOgBcA FUAcwBlAHI AcwBcAGEAb ABmAG8AbgB zAFwAQQBwA HAARABhAHQ AYQBcAFIAb wBhAG0AaQB uAGcAXABBA HIAZwB1AG0 AZQBuAHQAQ wBvAHUAbgB 0AFwAQwB1A HIAcgBlAG4 AdAAuAGUAe ABlAA== MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7124 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WmiPrvSE.exe (PID: 3924 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
- Current.exe (PID: 7104 cmdline:
C:\Users\u ser\AppDat a\Roaming\ ArgumentCo unt\Curren t.exe MD5: FD3AD0AE7FE1BBEE4B2F2BD43A359393) - AddInUtil.exe (PID: 6044 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\Ad dInUtil.ex e MD5: 11BED2C86507F7DF04BA52CFC7EB7276) - AddInProcess.exe (PID: 5808 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\Ad dInProcess .exe -o po ol.hashvau lt.pro:80 -u 43i9Xqe bDi6cXV1AE DLwbJAxy2o rmYj4NbvNB 5LZDu7TWoe 9orevfsZPB b3LtSbPUXb v9bzUAbFZi RNQ2zfigeD Z7aCWf99.R IG_CPU -p x --algo r x/0 --cpu- max-thread s-hint=50 MD5: 929EA1AF28AFEA2A3311FD4297425C94)
- Current.exe (PID: 2584 cmdline:
C:\Users\u ser\AppDat a\Roaming\ ArgumentCo unt\Curren t.exe MD5: FD3AD0AE7FE1BBEE4B2F2BD43A359393)
- svchost.exe (PID: 2172 cmdline:
C:\Windows \System32\ svchost.ex e -k Local Service -p -s Licens eManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 31 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 21 entries |
Bitcoin Miner |
---|
Source: | Author: Joe Security: |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |