File name:

GamerHashExtractor_chusall.exe

Full analysis: https://app.any.run/tasks/325e7385-cec4-4e99-9501-b229f3083ca1
Verdict: Malicious activity
Threats:

Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth.

Analysis date: October 22, 2020, 01:36:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
miner
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

ECAF71D7C02A4A5D762B7AE4729E1263

SHA1:

F5B5AEFB2E6DC1C7D65E2D398871BCC923E27231

SHA256:

8995D808CC426027072323065C4B1075CA9C43FE4D16DCB4208A068626C78F25

SSDEEP:

6144:k7mgvmNN0aiVRUk+f878LD/PeS0KGsRHMXeGNnToj3lCs2Qd9NN0aiVRUk+f8786:+YijM1f8A3dhzYs2QFijM1f8A3Kr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • GamerHash.exe (PID: 4004)
    • Application was dropped or rewritten from another process

      • GamerHashLauncher.exe (PID: 3220)
      • GamerHash.exe (PID: 4004)
      • xmrig.gh (PID: 3148)
    • MINER was detected

      • xmrig.gh (PID: 3148)
    • Connects to CnC server

      • xmrig.gh (PID: 3148)
    • Writes to a start menu file

      • GamerHash.exe (PID: 4004)
  • SUSPICIOUS

    • Reads Environment values

      • GamerHashExtractor_chusall.exe.scr (PID: 2120)
      • GamerHash.exe (PID: 4004)
    • Executable content was dropped or overwritten

      • GamerHashExtractor_chusall.exe.scr (PID: 2120)
      • GamerHash.exe (PID: 4004)
    • Creates files in the user directory

      • GamerHash.exe (PID: 4004)
    • Starts application with an unusual extension

      • GamerHash.exe (PID: 4004)
  • INFO

    • Reads settings of System Certificates

      • GamerHash.exe (PID: 4004)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.scr | Windows screen saver (46.4)
.dll | Win32 Dynamic Link Library (generic) (23.3)
.exe | Win32 Executable (generic) (15.9)
.exe | Generic Win/DOS Executable (7.1)
.exe | DOS Executable Generic (7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:04:08 11:13:33+02:00
PEType: PE32
LinkerVersion: 48
CodeSize: 576000
InitializedDataSize: 27648
UninitializedDataSize: -
EntryPoint: 0x8e98e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.7.3.0
ProductVersionNumber: 1.7.3.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: GamerHash
FileVersion: 1.7.3
InternalName: GamerHashExtractor.exe
LegalCopyright: Copyright © GamerHash 2019
LegalTrademarks: -
OriginalFileName: GamerHashExtractor.exe
ProductName: GamerHash
ProductVersion: 1.7.3
AssemblyVersion: 1.7.3.0

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 08-Apr-2019 09:13:33
Comments: -
CompanyName: -
FileDescription: GamerHash
FileVersion: 1.7.3
InternalName: GamerHashExtractor.exe
LegalCopyright: Copyright © GamerHash 2019
LegalTrademarks: -
OriginalFilename: GamerHashExtractor.exe
ProductName: GamerHash
ProductVersion: 1.7.3
Assembly Version: 1.7.3.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 08-Apr-2019 09:13:33
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00002000
0x0008C994
0x0008CA00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.04577
.rsrc
0x00090000
0x0000689C
0x00006A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.23614
.reloc
0x00098000
0x0000000C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.10191

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.27907
940
UNKNOWN
UNKNOWN
RT_MANIFEST
2
3.52624
2440
UNKNOWN
UNKNOWN
RT_ICON
3
3.36711
4264
UNKNOWN
UNKNOWN
RT_ICON
4
3.03823
9640
UNKNOWN
UNKNOWN
RT_ICON
5
7.91931
6941
UNKNOWN
UNKNOWN
RT_ICON
32512
2.64638
76
UNKNOWN
UNKNOWN
RT_GROUP_ICON

Imports

mscoree.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
4
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start gamerhashextractor_chusall.exe.scr gamerhashlauncher.exe no specs gamerhash.exe #MINER xmrig.gh

Process information

PID
CMD
Path
Indicators
Parent process
2120"C:\Users\admin\Desktop\GamerHashExtractor_chusall.exe.scr" /SC:\Users\admin\Desktop\GamerHashExtractor_chusall.exe.scr
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
GamerHash
Exit code:
0
Version:
1.7.3
Modules
Images
c:\users\admin\desktop\gamerhashextractor_chusall.exe.scr
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3148"C:\Users\admin\AppData\Local\GamerHash\miners\xmrig_32_v1\xmrig.gh" --url=proxy.gamerhash.com:14444 --user=0xGamerHash:GamerHash#Benchmark --threads=2 --no-color --log-file="C:\Users\admin\AppData\Local\GamerHash\1.42.2\logs\benchmark_Xmrig32_RandomX_XMR_Cpu_2020_10_22_02_36_54_709.log" --coin=monero --http-port=5000 --donate-level=1C:\Users\admin\AppData\Local\GamerHash\miners\xmrig_32_v1\xmrig.gh
GamerHash.exe
User:
admin
Company:
www.xmrig.com
Integrity Level:
MEDIUM
Description:
XMRig miner
Exit code:
4294967295
Version:
5.0.1
Modules
Images
c:\users\admin\appdata\local\gamerhash\miners\xmrig_32_v1\xmrig.gh
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
3220"C:\Users\admin\AppData\Local\GamerHash\GamerHashLauncher.exe" /SC:\Users\admin\AppData\Local\GamerHash\GamerHashLauncher.exeGamerHashExtractor_chusall.exe.scr
User:
admin
Integrity Level:
MEDIUM
Description:
GamerHashLauncher
Exit code:
0
Version:
1.4.1
Modules
Images
c:\users\admin\appdata\local\gamerhash\gamerhashlauncher.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
4004"C:\Users\admin\AppData\Local\GamerHash\1.42.2\GamerHash.exe" /SC:\Users\admin\AppData\Local\GamerHash\1.42.2\GamerHash.exe
GamerHashLauncher.exe
User:
admin
Integrity Level:
MEDIUM
Description:
GamerHash
Exit code:
0
Version:
1.42.2
Modules
Images
c:\users\admin\appdata\local\gamerhash\1.42.2\gamerhash.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
Total events
1 265
Read events
1 205
Write events
60
Delete events
0

Modification events

(PID) Process:(2120) GamerHashExtractor_chusall.exe.scrKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
GamerHashExtractor_chusall.exe.scr
(PID) Process:(2120) GamerHashExtractor_chusall.exe.scrKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GamerHashExtractor_chusall_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2120) GamerHashExtractor_chusall.exe.scrKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GamerHashExtractor_chusall_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2120) GamerHashExtractor_chusall.exe.scrKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GamerHashExtractor_chusall_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(2120) GamerHashExtractor_chusall.exe.scrKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GamerHashExtractor_chusall_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(2120) GamerHashExtractor_chusall.exe.scrKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GamerHashExtractor_chusall_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2120) GamerHashExtractor_chusall.exe.scrKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GamerHashExtractor_chusall_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2120) GamerHashExtractor_chusall.exe.scrKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GamerHashExtractor_chusall_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2120) GamerHashExtractor_chusall.exe.scrKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GamerHashExtractor_chusall_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2120) GamerHashExtractor_chusall.exe.scrKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GamerHashExtractor_chusall_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
Executable files
10
Suspicious files
1
Text files
15
Unknown types
2

Dropped files

PID
Process
Filename
Type
2120GamerHashExtractor_chusall.exe.scrC:\Users\admin\AppData\Local\GamerHash\GamerHashExtractor.exeexecutable
MD5:
SHA256:
2120GamerHashExtractor_chusall.exe.scrC:\Users\admin\Desktop\GamerHash.lnklnk
MD5:
SHA256:
2120GamerHashExtractor_chusall.exe.scrC:\Users\admin\AppData\Local\GamerHash\1.42.2\licenses\BSD3ClauseSentry.txttext
MD5:
SHA256:
4004GamerHash.exeC:\Users\admin\AppData\Local\GamerHash\miners\xmrig_32_v1.zip
MD5:
SHA256:
2120GamerHashExtractor_chusall.exe.scrC:\Users\admin\AppData\Local\GamerHash\1.42.2\usernametext
MD5:
SHA256:
2120GamerHashExtractor_chusall.exe.scrC:\Users\admin\AppData\Local\GamerHash\1.42.2\licenses\LGPLv3.txttext
MD5:E6A600FD5E1D9CBDE2D983680233AD02
SHA256:DA7EABB7BAFDF7D3AE5E9F223AA5BDC1EECE45AC569DC21B3B037520B4464768
2120GamerHashExtractor_chusall.exe.scrC:\Users\admin\AppData\Local\GamerHash\1.42.2\log4net.dllexecutable
MD5:F64B733EAE44C8C66217386D5A0F2BF0
SHA256:AF5610C515D2244DB98C662636264C8177E89B1AFE407F88FD18A41D66F6E7E2
2120GamerHashExtractor_chusall.exe.scrC:\Users\admin\AppData\Local\GamerHash\1.42.2\ToastNotifications.dllexecutable
MD5:95B869374EFFC772B9B443EC665F0920
SHA256:9239B422167FD8EB93064F32306F5663D2A7FA4EAC462A94D7CBEB853D722E28
2120GamerHashExtractor_chusall.exe.scrC:\Users\admin\AppData\Local\GamerHash\1.42.2\Newtonsoft.Json.dllexecutable
MD5:5AFDA7C7D4F7085E744C2E7599279DB3
SHA256:F58C374FFCAAE4E36D740D90FBF7FE70D0ABB7328CD9AF3A0A7B70803E994BA4
2120GamerHashExtractor_chusall.exe.scrC:\Users\admin\AppData\Local\GamerHash\1.42.2\licenses\Apache2.txttext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
13
DNS requests
6
Threats
7

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2120
GamerHashExtractor_chusall.exe.scr
46.101.206.92:443
api.gamerhash.com
Digital Ocean, Inc.
DE
unknown
2120
GamerHashExtractor_chusall.exe.scr
13.35.253.25:443
d3klzeoaotcto8.cloudfront.net
US
suspicious
4004
GamerHash.exe
5.101.110.225:443
gamerhash-com.ams3.digitaloceanspaces.com
Digital Ocean, Inc.
NL
suspicious
4004
GamerHash.exe
46.101.206.92:443
api.gamerhash.com
Digital Ocean, Inc.
DE
unknown
5.101.110.225:443
gamerhash-com.ams3.digitaloceanspaces.com
Digital Ocean, Inc.
NL
suspicious
4004
GamerHash.exe
46.101.148.192:443
api.gamerhash.com
Digital Ocean, Inc.
DE
unknown
3148
xmrig.gh
165.227.141.229:14444
proxy.gamerhash.com
Digital Ocean, Inc.
DE
malicious

DNS requests

Domain
IP
Reputation
api.gamerhash.com
  • 46.101.206.92
  • 46.101.148.192
unknown
d3klzeoaotcto8.cloudfront.net
  • 13.35.253.25
  • 13.35.253.30
  • 13.35.253.139
  • 13.35.253.24
whitelisted
gamerhash-com.ams3.digitaloceanspaces.com
  • 5.101.110.225
suspicious
proxy.gamerhash.com
  • 165.227.141.229
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
3148
xmrig.gh
Potential Corporate Privacy Violation
ET POLICY Cryptocurrency Miner Checkin
3148
xmrig.gh
Misc activity
MINER [PTsecurity] CoinMiner CryptoNight XMRig JSON_RPC Client Login
3148
xmrig.gh
Misc activity
MINER [PTsecurity] Riskware/CoinMiner JSON_RPC Response
3148
xmrig.gh
Misc activity
MINER [PTsecurity] Risktool.W32.coinminer!c
3148
xmrig.gh
Misc activity
MINER [PTsecurity] CoinMiner CryptoNight XMRig JSON_RPC Client Login
2 ETPRO signatures available at the full report
No debug info