Overview
overview
10Static
static
10ETC XMR2/s...1).bat
windows10-1703-x64
1ETC XMR2/s...0).bat
windows10-1703-x64
1ETC XMR2/s...1).bat
windows10-1703-x64
1ETC XMR2/s...2).bat
windows10-1703-x64
1ETC XMR2/s...3).bat
windows10-1703-x64
1ETC XMR2/s...4).bat
windows10-1703-x64
1ETC XMR2/s...5).bat
windows10-1703-x64
1ETC XMR2/s...6).bat
windows10-1703-x64
1ETC XMR2/s...2).bat
windows10-1703-x64
1ETC XMR2/s...3).bat
windows10-1703-x64
1ETC XMR2/s...4).bat
windows10-1703-x64
1ETC XMR2/s...5).bat
windows10-1703-x64
1ETC XMR2/s...6).bat
windows10-1703-x64
1ETC XMR2/s...7).bat
windows10-1703-x64
1ETC XMR2/s...8).bat
windows10-1703-x64
1ETC XMR2/s...9).bat
windows10-1703-x64
1ETC XMR2/start.bat
windows10-1703-x64
1ETC XMR2/xmrig.exe
windows10-1703-x64
1Analysis
-
max time kernel
616s -
max time network
1784s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01-09-2024 08:04
Behavioral task
behavioral1
Sample
ETC XMR2/start (1).bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
ETC XMR2/start (10).bat
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ETC XMR2/start (11).bat
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
ETC XMR2/start (12).bat
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
ETC XMR2/start (13).bat
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
ETC XMR2/start (14).bat
Resource
win10-20240611-en
Behavioral task
behavioral7
Sample
ETC XMR2/start (15).bat
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
ETC XMR2/start (16).bat
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
ETC XMR2/start (2).bat
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
ETC XMR2/start (3).bat
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
ETC XMR2/start (4).bat
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
ETC XMR2/start (5).bat
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
ETC XMR2/start (6).bat
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
ETC XMR2/start (7).bat
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
ETC XMR2/start (8).bat
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
ETC XMR2/start (9).bat
Resource
win10-20240611-en
Behavioral task
behavioral17
Sample
ETC XMR2/start.bat
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
ETC XMR2/xmrig.exe
Resource
win10-20240611-en
General
-
Target
ETC XMR2/start (15).bat
-
Size
110B
-
MD5
14110e8344eed821c253e1dab34d19d3
-
SHA1
5a050b43227e5bc75fc75806be937b6b7b026ad7
-
SHA256
864fc45ef4b24e418ab797aa9ea1f783d1610130265e4584f80ddde3a5546faa
-
SHA512
2a4396d9a71f1a6b2be9b28c7b509f25d7d6d9d35d48261affa51ffdbaa123b9ad233a14d8fba60032fa380bfae3449dded75886dfc39163e84fa92c878a03b6
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 3036 xmrig.exe Token: SeLockMemoryPrivilege 3036 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 xmrig.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4144 wrote to memory of 3036 4144 cmd.exe 75 PID 4144 wrote to memory of 3036 4144 cmd.exe 75
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ETC XMR2\start (15).bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\ETC XMR2\xmrig.exexmrig.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x26f5F09149AfEE1dC78a5454E4bC8fB2c1e71fBD.cpu -p x2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3036
-