Threat name:
SilentXMRMiner, Xmrig
Alert
Classification:
troj.spyw.expl.evad.mine
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Detected Stratum mining protocol
Found direct / indirect Syscall (likely to bypass EDR)
Found strings related to Crypto-Mining
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sets debug register (to hijack the execution of another thread)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Bypass UAC via Fodhelper.exe
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powerup Write Hijack DLL
Suspicious command line found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
UAC bypass detected (Fodhelper)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected SilentXMRMiner
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1528504
Sample:
e7WMhx18XN.exe
Startdate:
08/10/2024
Architecture:
WINDOWS
Score:
100
163
pool.hashvault.pro
2->163
189
Sigma detected: Xmrig
2->189
191
Malicious sample detected
(through community Yara
rule)
2->191
193
Antivirus / Scanner
detection for submitted
sample
2->193
195
25 other signatures
2->195
14
e7WMhx18XN.exe
8
2->14
started
17
services64.exe
2->17
started
20
powershell.exe
2->20
started
22
10 other processes
2->22
signatures3
process4
file5
151
C:\Users\user\AppData\Local\Temp\paint.exe, PE32+
14->151
dropped
153
C:\Users\user\...\FodhelperBypassUAC.exe, PE32+
14->153
dropped
155
C:\Users\user\AppData\Local\Temp\b.bat, DOS
14->155
dropped
157
C:\Users\user\AppData\...\e7WMhx18XN.exe.log, CSV
14->157
dropped
24
cmd.exe
1
14->24
started
27
paint.exe
14->27
started
29
FodhelperBypassUAC.exe
2
14->29
started
169
Antivirus detection
for dropped file
17->169
171
Machine Learning detection
for dropped file
17->171
173
Writes to foreign memory
regions
17->173
185
2 other signatures
17->185
31
conhost.exe
6
17->31
started
175
Modifies the context
of a thread in another
process (thread injection)
20->175
177
Injects a PE file into
a foreign processes
20->177
34
dllhost.exe
20->34
started
36
conhost.exe
20->36
started
179
Suspicious powershell
command line found
22->179
181
Query firmware table
information (likely
to detect VMs)
22->181
183
Changes security center
settings (notifications,
updates, antivirus,
firewall)
22->183
38
dllhost.exe
22->38
started
40
powershell.exe
22->40
started
42
14 other processes
22->42
signatures6
process7
file8
201
Suspicious powershell
command line found
24->201
219
2 other signatures
24->219
44
powershell.exe
24->44
started
58
4 other processes
24->58
203
Antivirus detection
for dropped file
27->203
205
Machine Learning detection
for dropped file
27->205
221
2 other signatures
27->221
48
conhost.exe
4
27->48
started
207
UAC bypass detected
(Fodhelper)
29->207
50
cmd.exe
1
29->50
started
159
C:\Users\user\AppData\...\sihost64.exe, PE32+
31->159
dropped
161
C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+
31->161
dropped
209
Found strings related
to Crypto-Mining
31->209
211
Injects code into the
Windows Explorer (explorer.exe)
31->211
213
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
31->213
223
2 other signatures
31->223
60
2 other processes
31->60
215
Contains functionality
to inject code into
remote processes
34->215
225
2 other signatures
34->225
52
winlogon.exe
34->52
injected
217
Creates a thread in
another existing process
(thread injection)
38->217
54
lsass.exe
38->54
injected
56
cmd.exe
40->56
started
63
3 other processes
42->63
signatures9
process10
dnsIp11
147
C:\Windows\$rbx-onimai2\$rbx-CO2.bat, DOS
44->147
dropped
235
Sets debug register
(to hijack the execution
of another thread)
44->235
237
Modifies the context
of a thread in another
process (thread injection)
44->237
239
Suspicious command line
found
44->239
241
Found suspicious powershell
code related to unpacking
or dynamic code loading
44->241
65
cmd.exe
44->65
started
149
C:\Users\user\AppData\...\services64.exe, PE32+
48->149
dropped
68
cmd.exe
1
48->68
started
70
cmd.exe
1
48->70
started
72
fodhelper.exe
12
50->72
started
74
conhost.exe
50->74
started
80
3 other processes
56->80
243
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
58->243
165
pool.hashvault.pro
45.76.89.70, 54464, 80
AS-CHOOPAUS
United States
60->165
245
Antivirus detection
for dropped file
60->245
247
Query firmware table
information (likely
to detect VMs)
60->247
249
Machine Learning detection
for dropped file
60->249
251
4 other signatures
60->251
76
conhost.exe
60->76
started
78
conhost.exe
63->78
started
82
5 other processes
63->82
file12
signatures13
process14
signatures15
187
Suspicious powershell
command line found
65->187
84
powershell.exe
65->84
started
86
conhost.exe
65->86
started
88
cmd.exe
65->88
started
90
services64.exe
68->90
started
93
conhost.exe
68->93
started
95
conhost.exe
70->95
started
97
schtasks.exe
1
70->97
started
99
cmd.exe
1
72->99
started
process16
signatures17
101
cmd.exe
84->101
started
229
Writes to foreign memory
regions
90->229
231
Allocates memory in
foreign processes
90->231
233
Creates a thread in
another existing process
(thread injection)
90->233
104
conhost.exe
2
90->104
started
106
conhost.exe
99->106
started
process18
signatures19
197
Suspicious powershell
command line found
101->197
199
Suspicious command line
found
101->199
108
powershell.exe
101->108
started
112
conhost.exe
101->112
started
114
WMIC.exe
101->114
started
118
2 other processes
101->118
116
WerFault.exe
20
16
104->116
started
process20
dnsIp21
167
147.185.221.22, 54593, 54594, 54595
SALSGIVERUS
United States
108->167
253
Creates autostart registry
keys with suspicious
values (likely registry
only malware)
108->253
255
Creates autostart registry
keys with suspicious
names
108->255
257
Creates an autostart
registry key pointing
to binary in C:\Windows
108->257
259
5 other signatures
108->259
120
powershell.exe
108->120
started
123
powershell.exe
108->123
started
125
powershell.exe
108->125
started
127
2 other processes
108->127
signatures22
process23
signatures24
227
Injects a PE file into
a foreign processes
120->227
129
conhost.exe
120->129
started
131
powershell.exe
120->131
started
133
conhost.exe
123->133
started
135
powershell.exe
123->135
started
137
conhost.exe
125->137
started
139
powershell.exe
125->139
started
141
conhost.exe
127->141
started
143
conhost.exe
127->143
started
145
powershell.exe
127->145
started
process25
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://51.79.158.135/b.exe