Threat name:
Clipboard Hijacker, Stealc v2, Xmrig
Alert
Classification:
rans.troj.spyw.evad.mine
Adds a directory exclusion to Windows Defender
AI detected suspicious PE digital signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Deletes shadow drive data (may be related to ransomware)
Disable Windows Defender notifications (registry)
Drops PE files to the document folder of the user
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies power options to not sleep / hibernate
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Self deletion via cmd or bat file
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Schedule system process
Sigma detected: Stop EventLog
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Clipboard Hijacker
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1780325
Sample:
Sweater.exe
Startdate:
18/09/2025
Architecture:
WINDOWS
Score:
100
94
Found malware configuration
2->94
96
Antivirus detection
for URL or domain
2->96
98
Antivirus detection
for dropped file
2->98
100
15 other signatures
2->100
9
Sweater.exe
23
2->9
started
14
svchost.exe
2->14
started
16
cmd.exe
2->16
started
18
4 other processes
2->18
process3
dnsIp4
88
178.16.54.175, 49725, 80
DUSNET-ASDE
Germany
9->88
90
178.16.53.193, 49727, 80
DUSNET-ASDE
Germany
9->90
80
C:\Users\user\Documents\pjn5b6w4jZnE.exe, PE32+
9->80
dropped
82
C:\Users\user\Documents\K6gHaqiIkVfQ.exe, PE32+
9->82
dropped
84
YEr2KP0jEBhSDdVcS9...AdHgmKyw7FZq[1].exe, PE32+
9->84
dropped
86
mr5jFfcvZvZar7iVto...38Ox6k48cqPT[1].exe, PE32+
9->86
dropped
130
Query firmware table
information (likely
to detect VMs)
9->130
132
Drops PE files to the
document folder of the
user
9->132
134
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
9->134
138
11 other signatures
9->138
20
pjn5b6w4jZnE.exe
9
2
9->20
started
24
K6gHaqiIkVfQ.exe
15
9->24
started
26
cmd.exe
1
9->26
started
34
3 other processes
9->34
136
Changes security center
settings (notifications,
updates, antivirus,
firewall)
14->136
28
MpCmdRun.exe
1
14->28
started
30
conhost.exe
16->30
started
32
schtasks.exe
16->32
started
file5
signatures6
process7
file8
76
C:\ProgramData\Microsoft\...\WmiPrvSE.exe, PE32+
20->76
dropped
114
Antivirus detection
for dropped file
20->114
116
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
20->116
118
Query firmware table
information (likely
to detect VMs)
20->118
128
5 other signatures
20->128
36
cmd.exe
1
20->36
started
39
cmd.exe
20->39
started
41
powershell.exe
23
20->41
started
51
16 other processes
20->51
78
C:\Users\user\AppData\Roaming\...\svchost.exe, PE32+
24->78
dropped
120
Multi AV Scanner detection
for dropped file
24->120
122
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
24->122
124
Queries memory information
(via WMI often done
to detect virtual machines)
24->124
126
Drops PE files with
benign system names
24->126
43
cmd.exe
24->43
started
45
cmd.exe
24->45
started
47
cmd.exe
24->47
started
53
2 other processes
26->53
49
conhost.exe
28->49
started
signatures9
process10
signatures11
102
Uses ping.exe to sleep
36->102
104
Uses schtasks.exe or
at.exe to add and modify
task schedules
36->104
106
Uses powercfg.exe to
modify the power settings
36->106
108
Uses ping.exe to check
the status of other
devices and networks
36->108
55
net.exe
1
36->55
started
57
conhost.exe
36->57
started
110
Modifies power options
to not sleep / hibernate
39->110
64
8 other processes
39->64
112
Loading BitLocker PowerShell
Module
41->112
66
2 other processes
41->66
59
PING.EXE
43->59
started
62
conhost.exe
43->62
started
68
2 other processes
45->68
70
2 other processes
47->70
72
18 other processes
51->72
process12
dnsIp13
74
net1.exe
1
55->74
started
92
127.0.0.1
unknown
unknown
59->92
process14
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.