Malware Analysis Report

2025-08-06 02:11

Sample ID 241026-kwfpassemh
Target PUB2.rar
SHA256 8bbab7c6d8c74646fec9b68eff9a0e1a7f294a9ea4e11c46e9161540cb6c5f7e
Tags
miner xmrig
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8bbab7c6d8c74646fec9b68eff9a0e1a7f294a9ea4e11c46e9161540cb6c5f7e

Threat Level: Known bad

The file PUB2.rar was found to be: Known bad.

Malicious Activity Summary

miner xmrig

XMRig Miner payload

Xmrig family

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-10-26 08:56

Signatures

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Xmrig family

xmrig

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1629s

Max time network

1793s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (12).bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1612 wrote to memory of 2564 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 1612 wrote to memory of 2564 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (12).bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.240.197:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 197.240.204.15.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp

Files

memory/2564-0-0x000001E44A420000-0x000001E44A440000-memory.dmp

memory/2564-1-0x000001E44A4C0000-0x000001E44A4E0000-memory.dmp

memory/2564-3-0x000001E44A500000-0x000001E44A520000-memory.dmp

memory/2564-2-0x000001E44A4E0000-0x000001E44A500000-memory.dmp

memory/2564-5-0x000001E44A500000-0x000001E44A520000-memory.dmp

memory/2564-4-0x000001E44A4E0000-0x000001E44A500000-memory.dmp

Analysis: behavioral9

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1638s

Max time network

1789s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (6).bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5088 wrote to memory of 876 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 5088 wrote to memory of 876 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (6).bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.240.197:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 197.240.204.15.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 27.178.89.13.in-addr.arpa udp

Files

memory/876-0-0x000001EF5C6F0000-0x000001EF5C710000-memory.dmp

memory/876-1-0x000001EF5C740000-0x000001EF5C760000-memory.dmp

memory/876-3-0x000001EF5C780000-0x000001EF5C7A0000-memory.dmp

memory/876-2-0x000001EF5C760000-0x000001EF5C780000-memory.dmp

memory/876-4-0x000001EF5C760000-0x000001EF5C780000-memory.dmp

memory/876-5-0x000001EF5C780000-0x000001EF5C7A0000-memory.dmp

Analysis: behavioral10

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1344s

Max time network

1774s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (7).bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2224 wrote to memory of 2472 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 2224 wrote to memory of 2472 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (7).bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.244.104:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 104.244.204.15.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 27.73.42.20.in-addr.arpa udp

Files

memory/2472-0-0x000001D349B10000-0x000001D349B30000-memory.dmp

memory/2472-1-0x000001D3DBC90000-0x000001D3DBCB0000-memory.dmp

memory/2472-2-0x000001D3DC300000-0x000001D3DC320000-memory.dmp

memory/2472-3-0x000001D3DC0D0000-0x000001D3DC0F0000-memory.dmp

memory/2472-5-0x000001D3DC0D0000-0x000001D3DC0F0000-memory.dmp

memory/2472-4-0x000001D3DC300000-0x000001D3DC320000-memory.dmp

Analysis: behavioral14

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1615s

Max time network

1772s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr.bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2496 wrote to memory of 5068 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 2496 wrote to memory of 5068 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr.bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.244.104:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 104.244.204.15.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 101.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 98.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 23.173.189.20.in-addr.arpa udp

Files

memory/5068-0-0x0000020542200000-0x0000020542220000-memory.dmp

memory/5068-1-0x0000020542240000-0x0000020542260000-memory.dmp

memory/5068-3-0x0000020542280000-0x00000205422A0000-memory.dmp

memory/5068-2-0x0000020542260000-0x0000020542280000-memory.dmp

memory/5068-5-0x0000020542280000-0x00000205422A0000-memory.dmp

memory/5068-4-0x0000020542260000-0x0000020542280000-memory.dmp

Analysis: behavioral6

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1645s

Max time network

1786s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (3).bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3748 wrote to memory of 236 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 3748 wrote to memory of 236 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (3).bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.244.104:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 104.244.204.15.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 103.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 25.173.189.20.in-addr.arpa udp

Files

memory/236-0-0x0000016D9DF40000-0x0000016D9DF60000-memory.dmp

memory/236-1-0x0000016D9F870000-0x0000016D9F890000-memory.dmp

memory/236-2-0x0000016D9F8B0000-0x0000016D9F8D0000-memory.dmp

memory/236-3-0x0000016D9F890000-0x0000016D9F8B0000-memory.dmp

memory/236-4-0x0000016D9F8B0000-0x0000016D9F8D0000-memory.dmp

memory/236-5-0x0000016D9F890000-0x0000016D9F8B0000-memory.dmp

Analysis: behavioral7

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1343s

Max time network

1791s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (4).bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3272 wrote to memory of 824 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 3272 wrote to memory of 824 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (4).bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.244.104:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 104.244.204.15.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 104.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 123.10.44.20.in-addr.arpa udp
US 8.8.8.8:53 fd.api.iris.microsoft.com udp
FR 20.74.47.205:443 fd.api.iris.microsoft.com tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp

Files

memory/824-0-0x000002066A700000-0x000002066A720000-memory.dmp

memory/824-1-0x000002066C030000-0x000002066C050000-memory.dmp

memory/824-2-0x000002066C050000-0x000002066C070000-memory.dmp

memory/824-3-0x000002066C070000-0x000002066C090000-memory.dmp

memory/824-4-0x000002066C050000-0x000002066C070000-memory.dmp

memory/824-5-0x000002066C070000-0x000002066C090000-memory.dmp

Analysis: behavioral12

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1638s

Max time network

1790s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (9).bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1204 wrote to memory of 4572 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 1204 wrote to memory of 4572 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (9).bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.244.104:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 104.244.204.15.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 70.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 fd.api.iris.microsoft.com udp
IE 20.223.35.26:443 fd.api.iris.microsoft.com tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 3.173.189.20.in-addr.arpa udp

Files

memory/4572-0-0x00000124605C0000-0x00000124605E0000-memory.dmp

memory/4572-1-0x0000012460610000-0x0000012460630000-memory.dmp

memory/4572-3-0x00000124F2DC0000-0x00000124F2DE0000-memory.dmp

memory/4572-2-0x0000012460630000-0x0000012460650000-memory.dmp

memory/4572-5-0x00000124F2DC0000-0x00000124F2DE0000-memory.dmp

memory/4572-4-0x0000012460630000-0x0000012460650000-memory.dmp

Analysis: behavioral11

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1340s

Max time network

1791s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (8).bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4508 wrote to memory of 568 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 4508 wrote to memory of 568 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (8).bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.244.104:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.244.204.15.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 13.179.89.13.in-addr.arpa udp

Files

memory/568-0-0x000002A5D49F0000-0x000002A5D4A10000-memory.dmp

memory/568-1-0x000002A5D4A30000-0x000002A5D4A50000-memory.dmp

memory/568-2-0x000002A5D4A50000-0x000002A5D4A70000-memory.dmp

memory/568-3-0x000002A5D4A70000-0x000002A5D4A90000-memory.dmp

memory/568-4-0x000002A5D4A50000-0x000002A5D4A70000-memory.dmp

memory/568-5-0x000002A5D4A70000-0x000002A5D4A90000-memory.dmp

Analysis: behavioral13

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1336s

Max time network

1764s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie.bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3560 wrote to memory of 1600 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 3560 wrote to memory of 1600 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie.bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 15.204.244.104:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 104.244.204.15.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 99.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 23.173.189.20.in-addr.arpa udp

Files

memory/1600-0-0x000001FB089D0000-0x000001FB089F0000-memory.dmp

memory/1600-1-0x000001FB08B30000-0x000001FB08B50000-memory.dmp

memory/1600-2-0x000001FB08B50000-0x000001FB08B70000-memory.dmp

memory/1600-3-0x000001FB08B70000-0x000001FB08B90000-memory.dmp

memory/1600-5-0x000001FB08B70000-0x000001FB08B90000-memory.dmp

memory/1600-4-0x000001FB08B50000-0x000001FB08B70000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1371s

Max time network

1431s

Command Line

"C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

"C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 98.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 12.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 fd.api.iris.microsoft.com udp
NL 20.103.156.88:443 fd.api.iris.microsoft.com tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp

Files

memory/1204-0-0x0000021931610000-0x0000021931630000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1347s

Max time network

1759s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (10).bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1396 wrote to memory of 1120 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 1396 wrote to memory of 1120 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (10).bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.244.104:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 104.244.204.15.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 69.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 fd.api.iris.microsoft.com udp
IE 20.223.35.26:443 fd.api.iris.microsoft.com tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 12.173.189.20.in-addr.arpa udp

Files

memory/1120-0-0x000001F51C2E0000-0x000001F51C300000-memory.dmp

memory/1120-1-0x000001F51C330000-0x000001F51C350000-memory.dmp

memory/1120-3-0x000001F51C370000-0x000001F51C390000-memory.dmp

memory/1120-2-0x000001F51C350000-0x000001F51C370000-memory.dmp

memory/1120-5-0x000001F51C370000-0x000001F51C390000-memory.dmp

memory/1120-4-0x000001F51C350000-0x000001F51C370000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1344s

Max time network

1794s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (11).bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4132 wrote to memory of 4744 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 4132 wrote to memory of 4744 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (11).bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.244.104:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 104.244.204.15.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 fd.api.iris.microsoft.com udp
FR 20.74.47.205:443 fd.api.iris.microsoft.com tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 25.173.189.20.in-addr.arpa udp

Files

memory/4744-0-0x0000012A386F0000-0x0000012A38710000-memory.dmp

memory/4744-1-0x0000012A38820000-0x0000012A38840000-memory.dmp

memory/4744-2-0x0000012A38840000-0x0000012A38860000-memory.dmp

memory/4744-3-0x0000012A38860000-0x0000012A38880000-memory.dmp

memory/4744-4-0x0000012A38840000-0x0000012A38860000-memory.dmp

memory/4744-5-0x0000012A38860000-0x0000012A38880000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1349s

Max time network

1762s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (2).bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 964 wrote to memory of 3740 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 964 wrote to memory of 3740 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (2).bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.240.197:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 197.240.204.15.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 13.179.89.13.in-addr.arpa udp

Files

memory/3740-0-0x000002798F6E0000-0x000002798F700000-memory.dmp

memory/3740-1-0x000002798F720000-0x000002798F740000-memory.dmp

memory/3740-2-0x000002798F740000-0x000002798F760000-memory.dmp

memory/3740-3-0x000002798F870000-0x000002798F890000-memory.dmp

memory/3740-4-0x000002798F740000-0x000002798F760000-memory.dmp

memory/3740-5-0x000002798F870000-0x000002798F890000-memory.dmp

Analysis: behavioral8

Detonation Overview

Submitted

2024-10-26 08:56

Reported

2024-10-26 09:28

Platform

win10ltsc2021-20241023-en

Max time kernel

1621s

Max time network

1781s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (5).bat"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3268 wrote to memory of 3360 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe
PID 3268 wrote to memory of 3360 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PUB2\zephyr - Copie (5).bat"

C:\Users\Admin\AppData\Local\Temp\PUB2\xmrig.exe

xmrig.exe -o us-zephyr.miningocean.org:5342 -u ZEPHYR2c1KpUmMcFb1DgEejg8bgrit4x9L8TUEk2e7B7gbtwtHDVyKCUZEzu4zQMnGjgZjJZES6wnefC6FgLJeyL6Ahz2SsWsoK1Y -p scall -a rx/0 -k

Network

Country Destination Domain Proto
US 8.8.8.8:53 us-zephyr.miningocean.org udp
US 15.204.240.197:5342 us-zephyr.miningocean.org tcp
US 8.8.8.8:53 197.240.204.15.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 66.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 171.117.168.52.in-addr.arpa udp

Files

memory/3360-0-0x000002BB83060000-0x000002BB83080000-memory.dmp

memory/3360-1-0x000002BB830B0000-0x000002BB830D0000-memory.dmp

memory/3360-3-0x000002BB830F0000-0x000002BB83110000-memory.dmp

memory/3360-2-0x000002BB830D0000-0x000002BB830F0000-memory.dmp

memory/3360-5-0x000002BB830F0000-0x000002BB83110000-memory.dmp

memory/3360-4-0x000002BB830D0000-0x000002BB830F0000-memory.dmp