Threat name:
Go Injector, MicroClip, Vidar, Xmrig
Alert
Classification:
troj.adwa.spyw.evad.mine
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject code into remote processes
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Searches for specific processes (likely to inject)
Sigma detected: Disable power options
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Stop EventLog
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Go Injector
Yara detected Powershell download and execute
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1479944
Sample:
Setup .exe
Startdate:
24/07/2024
Architecture:
WINDOWS
Score:
100
111
steamcommunity.com
2->111
113
s3-w.us-east-1.amazonaws.com
2->113
115
4 other IPs or domains
2->115
123
Multi AV Scanner detection
for domain / URL
2->123
125
Found malware configuration
2->125
127
Malicious sample detected
(through community Yara
rule)
2->127
129
18 other signatures
2->129
12
Setup .exe
2
2->12
started
15
Updater.exe
2->15
started
18
PSZC.exe
2->18
started
20
7 other processes
2->20
signatures3
process4
file5
167
Found many strings related
to Crypto-Wallets (likely
being stolen)
12->167
169
Writes to foreign memory
regions
12->169
171
Allocates memory in
foreign processes
12->171
173
Injects a PE file into
a foreign processes
12->173
22
BitLockerToGo.exe
1
43
12->22
started
109
C:\Windows\Temp\doyztlahdjhp.sys, PE32+
15->109
dropped
175
Multi AV Scanner detection
for dropped file
15->175
177
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
15->177
179
Machine Learning detection
for dropped file
15->179
189
6 other signatures
15->189
27
powershell.exe
15->27
started
29
cmd.exe
15->29
started
31
sc.exe
15->31
started
35
2 other processes
15->35
181
Query firmware table
information (likely
to detect VMs)
18->181
183
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
18->183
185
Hides threads from debuggers
18->185
191
2 other signatures
18->191
187
Changes security center
settings (notifications,
updates, antivirus,
firewall)
20->187
33
MpCmdRun.exe
20->33
started
signatures6
process7
dnsIp8
117
steamcommunity.com
23.192.247.89, 443, 49704
AKAMAI-ASUS
United States
22->117
119
5.75.212.60, 443, 49705, 49706
HETZNER-ASDE
Germany
22->119
121
3 other IPs or domains
22->121
101
C:\Users\user\AppData\Local\...\Update[1].exe, PE32
22->101
dropped
103
C:\Users\user\AppData\...\Update2[1].exe, PE32+
22->103
dropped
105
C:\ProgramData\softokn3.dll, PE32
22->105
dropped
107
7 other files (5 malicious)
22->107
dropped
147
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
22->147
149
Found many strings related
to Crypto-Wallets (likely
being stolen)
22->149
151
Contains functionality
to inject code into
remote processes
22->151
155
5 other signatures
22->155
37
AFIEGIECGC.exe
4
22->37
started
41
GCGIDGCGIE.exe
1
3
22->41
started
43
cmd.exe
22->43
started
153
Loading BitLocker PowerShell
Module
27->153
45
conhost.exe
27->45
started
47
conhost.exe
29->47
started
49
wusa.exe
29->49
started
51
conhost.exe
31->51
started
53
conhost.exe
33->53
started
55
2 other processes
35->55
file9
signatures10
process11
file12
95
C:\ProgramDatabehaviorgraphoogleUpdater\PSZC.exe, PE32
37->95
dropped
131
Antivirus detection
for dropped file
37->131
133
Multi AV Scanner detection
for dropped file
37->133
135
Query firmware table
information (likely
to detect VMs)
37->135
143
4 other signatures
37->143
57
cmd.exe
1
37->57
started
97
C:\ProgramDatabehaviorgraphoogleUP\Chrome\Updater.exe, PE32+
41->97
dropped
99
C:\Windows\System32\drivers\etc\hosts, ASCII
41->99
dropped
137
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
41->137
139
Machine Learning detection
for dropped file
41->139
141
Uses powercfg.exe to
modify the power settings
41->141
145
4 other signatures
41->145
59
powershell.exe
23
41->59
started
62
cmd.exe
41->62
started
64
sc.exe
41->64
started
70
12 other processes
41->70
66
conhost.exe
43->66
started
68
timeout.exe
43->68
started
signatures13
process14
signatures15
72
PSZC.exe
3
57->72
started
75
conhost.exe
57->75
started
77
timeout.exe
1
57->77
started
165
Loading BitLocker PowerShell
Module
59->165
79
conhost.exe
59->79
started
81
conhost.exe
62->81
started
83
wusa.exe
62->83
started
85
conhost.exe
64->85
started
87
conhost.exe
70->87
started
89
11 other processes
70->89
process16
signatures17
157
Antivirus detection
for dropped file
72->157
159
Multi AV Scanner detection
for dropped file
72->159
161
Query firmware table
information (likely
to detect VMs)
72->161
163
6 other signatures
72->163
91
schtasks.exe
72->91
started
process18
process19
93
conhost.exe
91->93
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.