Classification:
troj.adwa.spyw.evad.mine
.NET source code contains process injector
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
DNS related to crypt mining pools
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Stop EventLog
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1779529
Sample:
s8nn1xPrUrd.exe
Startdate:
17/09/2025
Architecture:
WINDOWS
Score:
100
94
xmr-eu1.nanopool.org
2->94
96
chrome1update.shop
2->96
98
michelsaliba.com.br
2->98
104
Found malware configuration
2->104
106
Malicious sample detected
(through community Yara
rule)
2->106
108
Antivirus detection
for URL or domain
2->108
112
23 other signatures
2->112
10
s8nn1xPrUrd.exe
2->10
started
13
updater.exe
2->13
started
16
powershell.exe
2->16
started
signatures3
110
DNS related to crypt
mining pools
94->110
process4
file5
140
Writes to foreign memory
regions
10->140
142
Allocates memory in
foreign processes
10->142
144
Injects a PE file into
a foreign processes
10->144
18
MSBuild.exe
22
10->18
started
23
MSBuild.exe
10->23
started
25
MSBuild.exe
10->25
started
92
C:\Windows\Temp\rgnjfvdbjwqd.sys, PE32+
13->92
dropped
146
Antivirus detection
for dropped file
13->146
148
Query firmware table
information (likely
to detect VMs)
13->148
150
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
13->150
156
8 other signatures
13->156
27
powershell.exe
13->27
started
29
cmd.exe
13->29
started
31
sc.exe
13->31
started
37
10 other processes
13->37
152
Found many strings related
to Crypto-Wallets (likely
being stolen)
16->152
154
Modifies the context
of a thread in another
process (thread injection)
16->154
33
dllhost.exe
16->33
started
35
conhost.exe
16->35
started
signatures6
process7
dnsIp8
100
chrome1update.shop
172.67.220.95, 49719, 80
CLOUDFLARENETUS
United States
18->100
102
michelsaliba.com.br
148.113.216.81, 49721, 80
GOOGLE-PRIVATE-CLOUDUS
United States
18->102
84
C:\Users\user\AppData\...\OLLP9YpqSpYA.exe, PE32+
18->84
dropped
86
C:\Users\user\AppData\...\chrome_134[1].exe, PE32+
18->86
dropped
114
Found many strings related
to Crypto-Wallets (likely
being stolen)
18->114
116
Tries to harvest and
steal browser information
(history, passwords,
etc)
18->116
118
Writes to foreign memory
regions
18->118
130
3 other signatures
18->130
39
OLLP9YpqSpYA.exe
1
3
18->39
started
43
conhost.exe
18->43
started
45
chrome.exe
18->45
started
51
2 other processes
18->51
120
Switches to a custom
stack to bypass stack
traces
23->120
122
Loading BitLocker PowerShell
Module
27->122
47
conhost.exe
27->47
started
53
2 other processes
29->53
49
conhost.exe
31->49
started
124
Injects code into the
Windows Explorer (explorer.exe)
33->124
126
Creates a thread in
another existing process
(thread injection)
33->126
128
Injects a PE file into
a foreign processes
33->128
55
3 other processes
33->55
57
8 other processes
37->57
file9
signatures10
process11
file12
88
C:\ProgramDatabehaviorgraphoogle\Chrome\updater.exe, PE32+
39->88
dropped
90
C:\Windows\System32\drivers\etc\hosts, ASCII
39->90
dropped
132
Antivirus detection
for dropped file
39->132
134
Query firmware table
information (likely
to detect VMs)
39->134
136
Uses powercfg.exe to
modify the power settings
39->136
138
8 other signatures
39->138
59
powershell.exe
23
39->59
started
62
cmd.exe
1
39->62
started
64
powercfg.exe
1
39->64
started
66
13 other processes
39->66
signatures13
process14
signatures15
158
Found suspicious powershell
code related to unpacking
or dynamic code loading
59->158
160
Loading BitLocker PowerShell
Module
59->160
68
conhost.exe
59->68
started
70
conhost.exe
62->70
started
72
wusa.exe
62->72
started
74
conhost.exe
64->74
started
76
conhost.exe
66->76
started
78
conhost.exe
66->78
started
80
conhost.exe
66->80
started
82
9 other processes
66->82
process16
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.