Windows
Analysis Report
New-inst-x64.exe
Overview
General Information
Detection
LummaC Stealer, Xmrig
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected Xmrig cryptocurrency miner
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject code into remote processes
Loading BitLocker PowerShell Module
PE file contains section with special chars
PE file has nameless sections
Queries memory information (via WMI often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses known network protocols on non-standard ports
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Yara signature match
Classification
- System is w10x64
New-inst-x64.exe (PID: 7780 cmdline:
"C:\Users\ user\Deskt op\New-ins t-x64.exe" MD5: D91B1E9DB00162B86D2D3C14E1A943CE) cmd.exe (PID: 7984 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ta sklist" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7996 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) tasklist.exe (PID: 8028 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) cmd.exe (PID: 8068 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "po wershell - Command "G et-WmiObje ct Win32_P ortConnect or"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 8076 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 8116 cmdline:
powershell -Command "Get-WmiOb ject Win32 _PortConne ctor" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) cmd.exe (PID: 7236 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ne t session" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7276 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 7496 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ta skkill /F /IM SecHea lthUI.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7476 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 7528 cmdline:
taskkill / F /IM SecH ealthUI.ex e MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) cmd.exe (PID: 7564 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "po wershell - Command "A dd-MpPrefe rence -Exc lusionPath 'C:\Users \user\AppD ata'"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7604 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 5736 cmdline:
powershell -Command "Add-MpPre ference -E xclusionPa th 'C:\Use rs\user\Ap pData'" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) cmd.exe (PID: 5344 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "po wershell - Command "A dd-MpPrefe rence -Exc lusionPath 'C:\Users \user\AppD ata'"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 6104 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7568 cmdline:
powershell -Command "Add-MpPre ference -E xclusionPa th 'C:\Use rs\user\Ap pData'" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) vbczvzznbmunxtn.exe (PID: 4348 cmdline:
C:\Users\u ser\AppDat a\Local\Mi crosoft\vb czvzznbmun xtn.exe MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 2324 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 3028 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 4380 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 7628 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 2964 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 3580 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 2492 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 2172 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 2576 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 5704 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 7616 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 5736 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 7612 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 7600 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 352 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 5348 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 4344 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 1292 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 8088 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 7676 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 5828 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 8100 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 4796 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 2224 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 5580 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152) vbczvzznbmunxtn.exe (PID: 3840 cmdline:
"C:\Users\ user\AppDa ta\Local\M icrosoft\v bczvzznbmu nxtn.exe" MD5: C565BB41F99B97BBBFCC781D595BC152)
svchost.exe (PID: 7876 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
svchost.exe (PID: 2612 cmdline:
C:\Windows \System32\ svchost.ex e -k Netwo rkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
svchost.exe (PID: 7472 cmdline:
C:\Windows \system32\ svchost.ex e -k Unist ackSvcGrou p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
SgrmBroker.exe (PID: 8008 cmdline:
C:\Windows \system32\ SgrmBroker .exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
svchost.exe (PID: 8176 cmdline:
C:\Windows \System32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
svchost.exe (PID: 8072 cmdline:
C:\Windows \System32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
{"C2 url": ["menuedgarli.shop/AUIqn", "featureccus.shop/bdMAn", "mrodularmall.top/aNzS", "jowinjoinery.icu/bdWUa", "legenassedk.top/bdpWO", "htardwarehu.icu/Sbdsa", "cjlaspcorne.icu/DbIps", "bugildbett.top/bAuz"], "Build id": "9eddd878e03715edd627f50c1f29ec6d309b2d28521a9b9872d266ca"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
MacOS_Cryptominer_Xmrig_241780a1 | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-13T10:32:19.286273+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49727 | 147.45.124.241 | 80 | TCP |
2025-03-13T10:32:23.322794+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49727 | 147.45.124.241 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-13T10:32:19.286273+0100 | 2829056 | 2 | Crypto Currency Mining Activity Detected | 192.168.2.4 | 49727 | 147.45.124.241 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-13T10:32:40.812853+0100 | 2854802 | 1 | Domain Observed Used for C2 Detected | 185.236.26.111 | 5968 | 192.168.2.4 | 49730 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Bitcoin Miner |
---|
Source: | File source: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 28_2_0046FCDE | |
Source: | Code function: | 28_2_0046FD8F | |
Source: | Code function: | 29_2_0046FCDE | |
Source: | Code function: | 29_2_0046FD8F |
Networking |
---|
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | HTTP traffic detected: |