Report
Report
#2141404
Verdict Reason: -
ID #852838
MD5 4197eeb783ac6250fe918d469d0805f0
SHA1 3100575f768290af586d855f2ecf952b5aaae7b3
SHA256 f43b25a5501033f574f0467cdf7534f50cdbec94c3d8a173a80ee9f54fce55eb
OVERVIEW
VMRay Threat Identifiers (23 rules, 44 matches)
• Rule "XMRIG_Miner" from ruleset "PUAs" has matched on a memory dump for (process #13) nslookup.exe.
• (Process #4) svchost.exe executes WMI query: Select CommandLine from Win32_Process where Name='nslookup.exe'.
• (Process #9) sihost64.exe executes WMI query: Select CommandLine from Win32_Process where Name='nslookup.exe'.
2/5 Network Connection Sets up server that accepts incoming connections 1 Backdoor
• (Process #1) svchost.exe starts (process #2) cmd.exe with a hidden window.
• (Process #1) svchost.exe starts (process #4) svchost.exe with a hidden window.
• (Process #4) svchost.exe starts (process #2) cmd.exe with a hidden window.
• (Process #4) svchost.exe starts (process #9) sihost64.exe with a hidden window.
• (Process #4) svchost.exe starts (process #13) nslookup.exe with a hidden window.
• (Process #4) svchost.exe allocates a page in a foreign process with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code.
• (Process #13) nslookup.exe accepts an incoming TCP connection from host "168.119.38.182:80".
#T1047 #T1082
#T1053 #T1053 #T1065
Windows #T1143 Hidden System
Scheduled Scheduled Uncommonly
Management Window Information
Task Task Used Port
Instrumentation Discovery
#T1016
#T1053 #T1045 System
Scheduled Software Network
Task Packing Configuration
Discovery
#T1057
#T1014 Rootkit Process
Discovery
Sample Information
ID #852838
MD5 4197eeb783ac6250fe918d469d0805f0
SHA1 3100575f768290af586d855f2ecf952b5aaae7b3
SHA256 f43b25a5501033f574f0467cdf7534f50cdbec94c3d8a173a80ee9f54fce55eb
SSDeep 768:g2khNnCxRoB30kHmiCvkSrFJV+0JqK6ecvMIcfat30Qi9EW3tyC+eJK:IfCxRoB3H33Sh+0MEc0xAkVftTJK
Has Macros
Analysis Information
Reputation Enabled
WHOIS Enabled
Built-in AV Enabled
Built-in AV Applied On Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps, Embedded Files
Number of AV Matches 2
YARA Enabled
YARA Applied On Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps, Embedded Files
Screenshots truncated
NETWORK
General
4 contacted IP addresses
0 URLs extracted
0 files downloaded
DNS
1 nameservers contacted
HTTP/S
HTTP Requests
Method URL Dest. IP Dest. Port Status Code Response Size Verdict
https://bitbucket.org/Sanctam/sanctam/raw/
GET d2123dc19ea65d0fdce7b5d17328d978c42b18cc/includes/ - - 0 bytes NA
xmrig
DNS Requests
168.119.38.182,
A pool.hashvault.pro NoError NA
49.12.130.173
BEHAVIOR
Process Graph
#16
taskhostw.exe
Child Process
#18
sihost.exe
Child Process
#19
taskhostw.exe
Child Process
Child Process
#24
taskhostw.exe
Child Process
#25
svchost.exe
#31
locationnotificationwindows.exe #5 Created Scheduled Job #6
Child Process schtasks.exe svchost.exe
#2
Child Process cmd.exe #7 Child Process #10
#1 cmd.exe schtasks.exe
Sample Start Child Process
svchost.exe Child Process
Child Process #9
#4 sihost64.exe
svchost.exe
Modify Memory
ID 1
Return Code 0
PID 6992
Bitness 64 Bit
f43b25a5501033f574f0467cdf7534f50cdbec94c3d8a173a80ee9f54fce55
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\svchost.exe 42.00 KB
eb
Host Behavior
Type Count
File 5
Process 2
User 1
System 2
ID 2
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\svchost.exe"' &
Command Line
exit
Return Code 0
PID 7680
Bitness 64 Bit
Host Behavior
Type Count
Module 1
Environment 8
Process 1
ID 4
Return Code 0
PID 7888
Bitness 64 Bit
C:
137adb47aba435999b6c31b404c00b5dc153a2e5d700ec0152c72b3189
\Users\RDhJ0CNFevzX\AppData\Roaming\Microsoft\Libs\sihost64.e 7.50 KB
121332
xe
C: 11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160
14.20 KB
\Users\RDhJ0CNFevzX\AppData\Roaming\Microsoft\Libs\WR64.sys ee5
C:
2294b4b34c025aa294685f8b37732bc97466a6d15054f4b3b2b4fcc74af3
\Users\RDhJ0CNFevzX\AppData\Roaming\Microsoft\Libs\sihost64.l 2020.77 KB
6d64
og
Host Behavior
Type Count
File 36
Process 3
User 1
System 9
- 11
Registry 24
Module 57
COM 3
- 1
Environment 8
- 14
- 3
Network Behavior
Type Count
HTTPS 1
DNS 2
TCP 2
ID 5
Command Line schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\svchost.exe"'
Return Code 0
PID 7828
Bitness 64 Bit
Host Behavior
Type Count
Module 3
System 3
COM 1
File 6
ID 6
Monitor Start Time Start Time: 84679, Reason: Created Scheduled Job
PID 996
Bitness 64 Bit
ID 7
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\svchost.exe"' &
Command Line
exit
Return Code 0
PID 6568
Bitness 64 Bit
Host Behavior
Type Count
Module 1
Environment 8
Process 1
ID 9
PID 6600
Bitness 64 Bit
Host Behavior
Type Count
File 8
- 1
Module 50
COM 6
- 2
ID 10
Command Line schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\svchost.exe"'
Return Code 0
PID 6628
Bitness 64 Bit
Host Behavior
Type Count
Module 3
System 3
COM 1
File 6
ID 13
PID 6748
Bitness 64 Bit
Injection Type Source Process Source / Target TID Address / Name Size Success Count
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x140000000(5368709120) 0x400 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x140001000(5368713216) 0x349200 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x14034b000(5372162048) 0x12e800 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x14047a000(5373403136) 0x11600 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x140730000(5376245760) 0x21400 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x140752000(5376385024) 0xe00 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x140753000(5376389120) 0xa00 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x140754000(5376393216) 0x2000 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x140756000(5376401408) 0x1200 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x140758000(5376409600) 0x200 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x140759000(5376413696) 0x600 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x14075a000(5376417792) 0x8a00 1
\local\temp\svchost.exe
#4: c:
Modify Memory \users\rdhj0cnfevzx\appdata 0x1ec8 0x2ec010(3063824) 0x8 1
\local\temp\svchost.exe
#4: c:
0x7ffc2f6dc230(1407211042
Modify Control Flow \users\rdhj0cnfevzx\appdata 0x1ec8 / 0x1a60 - 1
08432)
\local\temp\svchost.exe
Host Behavior
Type Count
Module 121
File 7
System 69
Environment 1
User 12
- 3
Process 110
- 3
Network Behavior
Type Count
DNS 1
TCP 1
ID 15
Monitor Start Time Start Time: 158868, Reason: Created Scheduled Job
PID 1012
Bitness 64 Bit
Host Behavior
Type Count
- 4
COM 2
ID 16
PID 1308
Bitness 64 Bit
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852
- 0 bytes
b855
Host Behavior
Type Count
Registry 7
System 16
Module 4
ID 18
PID 1448
Bitness 64 Bit
ID 19
Return Code 0
PID 1556
Bitness 64 Bit
Host Behavior
Type Count
Registry 4
System 11
ID 20
Return Code 0
PID 1580
Bitness 64 Bit
ID 24
PID 2144
Bitness 64 Bit
ID 25
PID 2184
Bitness 64 Bit
ID 31
PID 2432
Bitness 64 Bit
ARTIFACTS
File
SHA256 File Names Category File Size MIME Type Operations Verdict
C:
f43b25a5501033f574f0467cd \Users\RDhJ0CNFevzX\AppData\Loc application/
f7534f50cdbec94c3d8a173a al\Temp\svchost.exe, C: Sample File 42.00 KB vnd.microsoft.portable- Read, Access, Write, Create MALICIOUS
80ee9f54fce55eb \Users\RDhJ0CNFevzX\Desktop\svc executable
host.exe
137adb47aba435999b6c31b C: application/
404c00b5dc153a2e5d700ec \Users\RDhJ0CNFevzX\AppData\Ro Dropped File 7.50 KB vnd.microsoft.portable- Access, Write, Create MALICIOUS
0152c72b3189121332 aming\Microsoft\Libs\sihost64.exe executable
11bd2c9f9e2397c9a16e0990 C: application/
e4ed2cf0679498fe0fd418a3d \Users\RDhJ0CNFevzX\AppData\Ro Dropped File 14.20 KB vnd.microsoft.portable- Access, Write, Create CLEAN
fdac60b5c160ee5 aming\Microsoft\Libs\WR64.sys executable
2294b4b34c025aa294685f8b C:
Access, Create, Delete,
37732bc97466a6d15054f4b3 \Users\RDhJ0CNFevzX\AppData\Ro Dropped File 2020.77 KB application/octet-stream CLEAN
Write
b2b4fcc74af36d64 aming\Microsoft\Libs\sihost64.log
Filename
C:
Access, Create, Delete,
\Users\RDhJ0CNFevzX\AppData\Roaming\Microsoft\Libs\sihost64.l Dropped File CLEAN
Write
og
C:
\Users\RDhJ0CNFevzX\AppData\Roaming\Microsoft\Libs\sihost64-2. Accessed File Access, Delete CLEAN
log
C:
\Users\RDhJ0CNFevzX\AppData\Roaming\Microsoft\Libs\sihost64.e Dropped File Access, Write, Create CLEAN
xe
C:
Dropped File Access, Write, Create CLEAN
\Users\RDhJ0CNFevzX\AppData\Roaming\Microsoft\Libs\WR64.sys
C:
\Windows\Microsoft.NET\Framework64\v4.0.30319\Config\machine. Accessed File Read, Access CLEAN
config
URL
https://bitbucket.org/Sanctam/sanctam/raw/
d2123dc19ea65d0fdce7b5d17328d978c42b18cc/ - 104.192.141.1 - GET SUSPICIOUS
includes/xmrig
Domain
IP
Registry
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
access svchost.exe CLEAN
NT\CurrentVersion
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
read, access svchost.exe CLEAN
NT\CurrentVersion\InstallationType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\
access svchost.exe CLEAN
AppContext
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\
access svchost.exe CLEAN
v4.0.30319
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\
read, access svchost.exe CLEAN
v4.0.30319\SchUseStrongCrypto
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Current
access svchost.exe CLEAN
Version\Internet Settings\Connections
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current
access svchost.exe CLEAN
Version\Internet Settings\Connections
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows
access svchost.exe CLEAN
\CurrentVersion\Internet Settings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\
read, access svchost.exe CLEAN
LegacyWPADSupport
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
access svchost.exe CLEAN
NT\CurrentVersion\Time Zones\W. Europe Standard Time
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
read, access svchost.exe CLEAN
NT\CurrentVersion\Time Zones\W. Europe Standard Time\TZI
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Time Zones\W. Europe Standard Time\Dynamic access svchost.exe CLEAN
DST
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Time Zones\W. Europe Standard read, access svchost.exe CLEAN
Time\MUI_Display
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
read, access svchost.exe CLEAN
NT\CurrentVersion\Time Zones\W. Europe Standard Time\MUI_Std
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
read, access svchost.exe CLEAN
NT\CurrentVersion\Time Zones\W. Europe Standard Time\MUI_Dlt
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\
read, access svchost.exe CLEAN
v4.0.30319\HWRPortReuseOnSocketBind
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Aut
access taskhostw.exe CLEAN
oEnrollment
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ce
access taskhostw.exe CLEAN
rtSvc\Configuration
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Cryptography\Cer
access, create taskhostw.exe CLEAN
tificateTemplateCache
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Cryptography\Cer
read, access taskhostw.exe CLEAN
tificateTemplateCache\Timestamp
Process
schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:
schtasks.exe SUSPICIOUS
\Users\RDhJ0CNFevzX\AppData\Local\Temp\svchost.exe"'
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:
cmd.exe CLEAN
\Users\RDhJ0CNFevzX\AppData\Local\Temp\svchost.exe"' & exit
YARA / AV
YARA (34)
Ruleset Name Rule Name Rule Description File Type File Name Classification Verdict
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
Ruleset Name Rule Name Rule Description File Type File Name Classification Verdict
PUAs XMRIG_Miner XMRIG: Monero mining software; PUA Memory Dump - PUA, Miner 3/5
Antivirus (2)
C:
Dropped File Gen:Variant.Bulz.455783 \Users\RDhJ0CNFevzX\AppData\Roaming\Microsoft\Libs\sihost64.e MALICIOUS
xe
ENVIRONMENT
Virtual Machine Information
Name win10_64_th2_en_mso2016
Description win10_64_th2_en_mso2016
Analyzer Information
Software Information