{"id":20683,"date":"2024-06-13T15:51:29","date_gmt":"2024-06-13T15:51:29","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=20683"},"modified":"2024-06-13T21:39:36","modified_gmt":"2024-06-13T21:39:36","slug":"hellminer-exe-malware-analysis","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/hellminer-exe-malware-analysis\/","title":{"rendered":"Hellminer.exe Coin Miner"},"content":{"rendered":"<p>Hellminer.exe is a process you can see in the Task Manager <strong>that indicates a malicious software activity<\/strong>. It stands out by the high CPU load it creates, making the system much less responsive. Let\u2019s figure out what this process is, and how to get rid of it.<\/p>\n<p><!--more--><\/p>\n<p>Hellminer malware has a potential <strong>to attack a wide range of devices<\/strong>, from IoT to server clusters. The final target of its activity is bringing profit to its masters with the use of your hardware. Ignoring the activity of this malicious program may lead to <strong>premature hardware failure and overall performance deterioration<\/strong>.<\/p>\n<div class=\"su-note\"  style=\"border-color:#e4e4ce;border-radius:3px;-moz-border-radius:3px;-webkit-border-radius:3px;\"><div class=\"su-note-inner su-u-clearfix su-u-trim\" style=\"background-color:#fefee8;border-color:#ffffff;color:#333333;border-radius:3px;-moz-border-radius:3px;-webkit-border-radius:3px;\"><strong>Modern malware samples often come in packs<\/strong>, meaning that one thing may signify the presence of several others. Do not hesitate with removal: scan your device with GridinSoft Anti-Malware and remove all the threats in one click. \ud83d\udc49\ud83c\udffc <a href=\"https:\/\/gridinsoft.com\/malicious-software-removal\">Get your system cleaned up<\/a>.<\/div><\/div>\n<h2>What is the Hellminer.exe process?<\/h2>\n<p><strong>This is a process associated with a malicious coin miner<\/strong>. Such malware aims at exploiting the system\u2019s hardware to mine cryptocurrencies, mainly DarkCoin and Monero. To maximize profits, hackers who stand behind this malware establish huge networks of infected computers. Hellminer takes up to 80% of CPU power in order to get substantial mining performance, making the system sluggish and uncomfortable to use.<\/p>\n<figure id=\"attachment_20690\" aria-describedby=\"caption-attachment-20690\" style=\"width: 1194px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/hellminer-exe-taskman.webp\" alt=\"Hellminer process Task Manager\" width=\"1194\" height=\"351\" class=\"size-full wp-image-20690\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/hellminer-exe-taskman.webp 1194w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/hellminer-exe-taskman-300x88.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/hellminer-exe-taskman-1024x301.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/hellminer-exe-taskman-768x226.webp 768w\" sizes=\"auto, (max-width: 1194px) 100vw, 1194px\" \/><figcaption id=\"caption-attachment-20690\" class=\"wp-caption-text\">Hellminer.exe process in Task Manager<\/figcaption><\/figure>\n<p>Malicious miners like this one typically get into the user systems through malvertising on the Web, or with the use of <a href=\"https:\/\/gridinsoft.com\/dropper\">dropper malware<\/a>. Both spreading ways though <strong>are commonly used by other malware<\/strong>, which means the risk that Hellminer is not the only infection running in the system.<\/p>\n<p>This malware appears to be different from other miners, as <a href=\"https:\/\/gridinsoft.com\/xmrig\">it is not based on XMRig<\/a>, a popular open-source mining software. Instead, it appears to be written in Python, and is likely a private development. <strong>Let\u2019s check out other interesting stuff<\/strong> I\u2019ve found during the analysis.<\/p>\n<h2>Hellminer Malware Analysis<\/h2>\n<p>It is not completely clear how Hellminer gets into the system; I suspect it is not much different from how malware miners typically spread \u2013 via dropper malware and malvertising. After the launch, the malware begins with a selection of anti-VM and <a href=\"https:\/\/medium.com\/@X3non_C0der\/anti-debugging-techniques-eda1868e0503\" target=\"_blank\" rel=\"noopener nofollow\">anti-debug checks<\/a>.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/hellminer-exec-chain.webp\" alt=\"Hellminer Execution chain\" width=\"790\" height=\"270\" class=\"aligncenter size-full wp-image-20694\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/hellminer-exec-chain.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/hellminer-exec-chain-300x103.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/hellminer-exec-chain-768x262.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><\/p>\n<p>Using the calls to WMI, it gets the info about the CPU, trying to find any signs of virtualization. Why I don\u2019t think it is just an immediate info gathering is because <strong>the very next step is listing the services and processes<\/strong>. Hellminer specifically seeks for traces of the VMWare virtualization environment. After these checks, the main payload is unfolded. Though, malware may as well use the info collected at this stage, to configure the mining process or <strong>as a part of the system fingerprint<\/strong>.<\/p>\n<p><code>wmic cpu get Name,CurrentClockSpeed,L2CacheSize,L3CacheSize,Description,Caption,Manufacturer \/format:list<\/code><\/p>\n<p>Fingerprinting starts with another call to WMIC, <strong><em>wmic os get Version<\/em><\/strong>. Malware attempts to receive quite a basic, if not scarce, set of data \u2013 just the info about the operating system. After that, malware gains persistence through the manipulation <strong>with another command and series of changes in Windows registry<\/strong>.<\/p>\n<p><code>%windir%\\System32\\svchost.exe -k WerSvcGroup<\/code> \u2013 starting Windows error reporting service to make it run the malware. This increases the level of privileges the malicious program has, also providing it with a disguise.<\/p>\n<p><code>HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_USE_IETLDLIST_FOR_DOMAIN_DETERMINATION<\/p>\n<p>HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\Security<\/code> &#8211; changing network security policies.<\/p>\n<p><strong>The final round of persistence<\/strong> involves another call to WMI, specifically to its Adaptation Service. Hellminer forces it to recursively launch the payload, ensuring continuous execution. This specific command is also a part of resource allocation for the mining process.<\/p>\n<p><code>wmiadap.exe \/F \/T \/R<\/code><\/p>\n<h3>Command Server Connectivity<\/h3>\n<p>Same as other malware miners, <strong>Hellminer does not have any extensive C2 communication<\/strong>. After finishing the steps from the above, it sends the blob of system information to the command server, effectively notifying it about the readiness. C2 returns the configuration file, which specifies the mining pool <a href=\"https:\/\/gridinsoft.com\/ip-address\">and the IP address<\/a> to connect to.<\/p>\n<p>Still, there is a thing that catches an eye \u2013 <strong>the form of command servers used by this malware<\/strong>. They do not look like C2 of a classic model, <strong>instead being a peer-to-peer one<\/strong>. In such a network, the role of a command server is given to one of the infected computers. \u201cReal\u201d server sporadically communicates with one, retrieving the information about the new devices and assigning the next system to get the C2 role. This drastically increases the sustainability of the network, making it particularly hard to disrupt <a href=\"https:\/\/gridinsoft.com\/command-and-control\">through the command server disruption<\/a>.<\/p>\n<p>During the analysis, I\u2019ve detected these command servers:<\/p>\n<ul>\n<li>20.99.184.37:443<\/li>\n<li>20.99.186.246:443<\/li>\n<li>23.216.147.64:443<\/li>\n<li>192.229.211.108:80<\/li>\n<li>20.99.133.109:443<\/li>\n<\/ul>\n<h2>Hellminer.exe Removal Guide<\/h2>\n<p>Removing Hellminer malware <strong>requires anti-malware software scanning<\/strong>. Such threats typically duplicate itselves to numerous folders across the system, with each acting as a backup. GridinSoft Anti-Malware is what would remove the malicious miner and all its copies in the matter of minutes.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp\" alt=\"GridinSoft Anti-Malware main screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22665\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.<\/p>\n<div style=\"text-align:center\"><a href=\"\/download\/antimalware\" class=\"btn border-black\" rel=\"nofollow\">Download Anti-Malware<\/a><\/div>\n<p>After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click \"Advanced mode\" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp\" alt=\"Scan results screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22666\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Click \"Clean Now\" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp\" alt=\"Removal finished\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22667\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Miner malware activity always correlates with cryptocurrency prices. <strong>At the moment, they are on the rise<\/strong>, meaning that more and more frauds will opt for this malware. The typical ways of spreading for malicious miners is malvertising, particularly ones in search engines. Avoiding it requires user attention: they typically mimic legitimate sites that spread freeware, but always have a different, mangled URL.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hellminer.exe is a process you can see in the Task Manager that indicates a malicious software activity. It stands out by the high CPU load it creates, making the system much less responsive. Let\u2019s figure out what this process is, and how to get rid of it.<\/p>\n","protected":false},"author":7,"featured_media":20693,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[17,4],"tags":[23,28,1528],"class_list":{"0":"post-20683","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-labs","8":"category-tips-tricks","9":"tag-coin-miner","10":"tag-malware","11":"tag-threat-analysis"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/hellminer-featured-image.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/20683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=20683"}],"version-history":[{"count":16,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/20683\/revisions"}],"predecessor-version":[{"id":22808,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/20683\/revisions\/22808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/20693"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=20683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=20683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=20683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}