Windows
Analysis Report
xB6r0wPRyb.exe
Overview
General Information
Sample name: | xB6r0wPRyb.exerenamed because original name is a hash value |
Original sample name: | 5fcb544f959283c6a069a7525ad0a2058b71245271ffbedfb481a47760821de2.exe |
Analysis ID: | 1480298 |
MD5: | 16c310c40604c5cd011f47dee2db303a |
SHA1: | 91199e53743df3a3f9fa50c7f3df2a4f0c84cedb |
SHA256: | 5fcb544f959283c6a069a7525ad0a2058b71245271ffbedfb481a47760821de2 |
Tags: | exe |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- xB6r0wPRyb.exe (PID: 7040 cmdline:
"C:\Users\ user\Deskt op\xB6r0wP Ryb.exe" MD5: 16C310C40604C5CD011F47DEE2DB303A) - conhost.exe (PID: 4924 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- svchost.exe (PID: 1272 cmdline:
C:\Windows \System32\ svchost.ex e -k Local Service -p -s Licens eManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
MacOS_Cryptominer_Xmrig_241780a1 | unknown | unknown |
| |
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
MacOS_Cryptominer_Xmrig_241780a1 | unknown | unknown |
|
System Summary |
---|
Source: | Author: vburov: |
Timestamp: | 2024-07-24T17:24:29.727255+0200 |
SID: | 2826930 |
Source Port: | 49706 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Crypto Currency Mining Activity Detected |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Bitcoin Miner |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process Stats: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_0000006E744FC209 | |
Source: | Code function: | 0_2_0000006E744FC719 | |
Source: | Code function: | 0_2_0000006E744FC1E1 |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Boot Survival |
---|
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Signature Results: |
Source: | System information queried: | Jump to behavior | ||
Source: | System information queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | System information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Thread information set: | Jump to behavior |
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtSetInformationThread: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 2 Process Injection | 331 Virtualization/Sandbox Evasion | OS Credential Dumping | 621 Security Software Discovery | Remote Services | Data from Local System | 1 Non-Application Layer Protocol | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Abuse Elevation Control Mechanism | 2 Software Packing | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 2 Process Injection | Security Account Manager | 331 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Abuse Elevation Control Mechanism | NTDS | 12 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Obfuscated Files or Information | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | ReversingLabs | Win64.Trojan.DisguisedXMRigMiner | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
auto.c3pool.org | 5.75.158.61 | true | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
88.198.117.174 | unknown | Germany | 24940 | HETZNER-ASDE | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1480298 |
Start date and time: | 2024-07-24 17:21:35 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 26s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | xB6r0wPRyb.exerenamed because original name is a hash value |
Original Sample Name: | 5fcb544f959283c6a069a7525ad0a2058b71245271ffbedfb481a47760821de2.exe |
Detection: | MAL |
Classification: | mal100.evad.mine.winEXE@3/1@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target xB6r0wPRyb.exe, PID 7040 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: xB6r0wPRyb.exe
Time | Type | Description |
---|---|---|
11:22:30 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
88.198.117.174 | Get hash | malicious | Xmrig | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
auto.c3pool.org | Get hash | malicious | Xmrig | Browse |
| |
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | DoublePulsar, ETERNALBLUE, Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | BlackMoon | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
HETZNER-ASDE | Get hash | malicious | Bdaejec, SmokeLoader | Browse |
| |
Get hash | malicious | Bdaejec, SmokeLoader | Browse |
| ||
Get hash | malicious | Sality | Browse |
| ||
Get hash | malicious | Bdaejec, SmokeLoader | Browse |
| ||
Get hash | malicious | Bdaejec, SmokeLoader | Browse |
| ||
Get hash | malicious | Bdaejec, SmokeLoader | Browse |
| ||
Get hash | malicious | Bdaejec, SmokeLoader | Browse |
| ||
Get hash | malicious | Bdaejec, SmokeLoader | Browse |
| ||
Get hash | malicious | Bdaejec, SmokeLoader | Browse |
| ||
Get hash | malicious | Bdaejec, SmokeLoader | Browse |
|
Process: | C:\Users\user\Desktop\xB6r0wPRyb.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 901120 |
Entropy (8bit): | 7.918798349397588 |
Encrypted: | false |
SSDEEP: | 24576:2x5cyLzoy4z5LPrMcs5dmYOYFQn1s97QJv8wB:2zbL0zzJsKJS1QJv8wB |
MD5: | 6DE502CDFAD448559A118D514AAC5330 |
SHA1: | 1BE69DECA1924590B2739956F1A5BAB203C73AB4 |
SHA-256: | 1A254CD8A09B66710CBF518F4CE13E2C30C826883DC5E7EDCB00BF1CF7C89C7C |
SHA-512: | 2B2F86C32A0233477058888CD737937F989F1240A3B960B0D4543FB7AF8388EBBF491C341B28E874D386C119936384EAC0A12FBC657F09205C934E6AE5A65436 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.965517847824391 |
TrID: |
|
File name: | xB6r0wPRyb.exe |
File size: | 23'395'348 bytes |
MD5: | 16c310c40604c5cd011f47dee2db303a |
SHA1: | 91199e53743df3a3f9fa50c7f3df2a4f0c84cedb |
SHA256: | 5fcb544f959283c6a069a7525ad0a2058b71245271ffbedfb481a47760821de2 |
SHA512: | e39f7f00b907fe6370c5d44ad3fb10c5dec1f2fe8f3cc5c93ce36a3e25316512a887f481e376baf4dec04ca12eb7d6106f521ab3ecccc631b600db49ef228692 |
SSDEEP: | 393216:s4Tg6yjP+ZSJVKCi6Iq4Vw+lGNeII1Kke/+DCNaNzJdPT5:s4Tg6y7JJVKvpq41lGcIyq/+DZNPN |
TLSH: | 1D3733B7A9C5B890C5DE41B12A988985B713EAD5ED23092D343F771B8D7320FDB8B610 |
File Content Preview: | MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$..........}\w..\w..\w....U.Qw....W..w....V.}w....c.Xw...../Uw...../.w...../zw....j.]w...../Nw....o.Kw..\w..6v...../hu...../zv...../_w. |
Icon Hash: | d08c8e8ea2868a54 |
Entrypoint: | 0x143ac9000 |
Entrypoint Section: | .taggant |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66150D27 [Tue Apr 9 09:40:55 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 62dc84212c31dc6fad4d7cd91eeaf282 |
Instruction |
---|
jmp 00007F4D10B30C3Ah |
paddusb mm4, qword ptr [ecx+eax+00h] |
add byte ptr [eax], al |
add cl, ch |
add byte ptr [eax], ah |
add byte ptr [eax], al |
push esp |
inc ecx |
inc edi |
inc edi |
add byte ptr [eax], ah |
add byte ptr [eax], al |
and ebx, dword ptr [ebx] |
add byte ptr [eax], al |
add dword ptr [eax], eax |
xor byte ptr [edx+09061F1Bh], al |
sub al, byte ptr [esi+0DF78648h] |
add dword ptr [edi], eax |
add ah, byte ptr [eax+30101B82h] |
sbb byte ptr [ebx], 0000000Ch |
add al, byte ptr [ecx] |
add dword ptr [ecx], esi |
or eax, 09060B30h |
pushad |
xchg byte ptr [eax+01h], cl |
add eax, dword ptr [edx+eax] |
add dword ptr [eax], esi |
or byte ptr [edi], 00000021h |
push es |
or dword ptr [edx], ebp |
xchg byte ptr [eax-7Ah], cl |
test dword ptr [A0010701h], 04120F82h |
or byte ptr [edi], 0000000Eh |
rol byte ptr [eax], 1 |
add dword ptr [eax], eax |
add al, cl |
mov cl, A1h |
add eax, dword ptr [eax] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [ecx], al |
add ah, bl |
int 50h |
pop ecx |
xchg eax, ebx |
stosd |
pushad |
dec edi |
pushad |
into |
add edx, edx |
pop edx |
mov eax, 46C5C0A6h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x806152 | 0x1a8 | .imports |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x808000 | 0x7c5c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x2698564 | 0x21714 | .themida |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x3ac8000 | 0x10 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x807038 | 0x28 | .tls |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
0x1000 | 0x390cb0 | 0x17e40b | 74af0aef08cc1e47ffc9b394ce9e5a54 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
0x392000 | 0x189ade | 0x9b16f | b7c85e8b7165f7cc5b448138e5d3106c | False | 0.986779945438546 | data | 7.9560094161857124 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
0x51c000 | 0x2b0e40 | 0x3a67 | 00a41b63bded68e52e164b1ed927fd1e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0x7cd000 | 0x215f4 | 0x1352a | 65a91d60f65116132fb6339739ddc100 | False | 0.9566623708083795 | data | 7.7149869774130675 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
0x7ef000 | 0xc56 | 0x5fd | 7e4f74255a9f23dbdbae0fd0209c0d81 | False | 1.0071754729288975 | data | 7.87743389445135 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
0x7f0000 | 0x26d1 | 0xf86 | 57703862d2060653454bfefb5ef4451d | False | 1.0027679919476598 | data | 7.92555741386833 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
0x7f3000 | 0x1184 | 0x987 | e07a30e425fe4224101dca12007208dd | False | 0.998359983599836 | data | 7.896548498610584 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
0x7f5000 | 0x7c59 | 0x2ae2 | a70bd9ac37df4f5ff911a5f3bb14caf2 | False | 1.001002004008016 | data | 7.965388009703109 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
0x7fd000 | 0x87c0 | 0x24b5 | 29571d8cd69c1c3a601258ce1fa069d9 | False | 0.9480685325103757 | data | 7.9179432693449865 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | |
.imports | 0x806000 | 0x1000 | 0x400 | 6cb4797928c34927778345fc13871892 | False | 0.333984375 | data | 3.0191147950274106 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x807000 | 0x1000 | 0x200 | 7736d593dc1d638a984bfb118305285b | False | 0.07421875 | data | 0.3504830562941642 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x808000 | 0x7e00 | 0x7e00 | fb3b5197c29938bc016e2580aaec13c6 | False | 0.34281994047619047 | data | 5.842637242625163 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.themida | 0x810000 | 0x1eaa000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.boot | 0x26ba000 | 0x140d400 | 0x140d400 | 40c331f860014e71442c62b4f5d96091 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0x3ac8000 | 0x1000 | 0x200 | c6b0413ede768f62254e448370028915 | False | 0.056640625 | GLS_BINARY_LSB_FIRST | 0.2083944074398449 | IMAGE_SCN_MEM_READ |
.taggant | 0x3ac9000 | 0x2200 | 0x2014 | ee6b011b6023aa550903815d0649fe0d | False | 0.597540185094983 | DOS executable (COM) | 6.835970853038605 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x808260 | 0x668 | Device independent bitmap graphic, 48 x 96 x 4, image size 0 | English | United States | 0.21890243902439024 |
RT_ICON | 0x8088d8 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 0 | English | United States | 0.3400537634408602 |
RT_ICON | 0x808bd0 | 0x1e8 | Device independent bitmap graphic, 24 x 48 x 4, image size 0 | English | United States | 0.35450819672131145 |
RT_ICON | 0x808dc8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 0 | English | United States | 0.46283783783783783 |
RT_ICON | 0x808f00 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | English | United States | 0.5026652452025586 |
RT_ICON | 0x809db8 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | English | United States | 0.5798736462093863 |
RT_ICON | 0x80a670 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 0 | English | United States | 0.40264976958525345 |
RT_ICON | 0x80ad48 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | English | United States | 0.3273121387283237 |
RT_ICON | 0x80b2c0 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | English | United States | 0.27344398340248965 |
RT_ICON | 0x80d878 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | English | United States | 0.37875234521575984 |
RT_ICON | 0x80e930 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 0 | English | United States | 0.37868852459016394 |
RT_ICON | 0x80f2c8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | English | United States | 0.4796099290780142 |
RT_GROUP_ICON | 0x80f740 | 0xae | data | English | United States | 0.5977011494252874 |
RT_VERSION | 0x80f800 | 0x2cc | data | 0.4720670391061452 | ||
RT_MANIFEST | 0x80fadc | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
kernel32.dll | GetModuleHandleA |
WS2_32.dll | ntohs |
PSAPI.DLL | GetProcessMemoryInfo |
IPHLPAPI.DLL | GetAdaptersAddresses |
USERENV.dll | GetUserProfileDirectoryW |
CRYPT32.dll | CertOpenStore |
USER32.dll | GetProcessWindowStation |
SHELL32.dll | SHGetSpecialFolderPathA |
ole32.dll | CoInitializeEx |
ADVAPI32.dll | GetUserNameW |
bcrypt.dll | BCryptGenRandom |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Protocol | SID | Signature | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
2024-07-24T17:24:29.727255+0200 | TCP | 2826930 | ETPRO COINMINER XMR CoinMiner Usage | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 24, 2024 17:22:31.640219927 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:22:31.645510912 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:22:31.645628929 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:22:31.645807028 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:22:31.655133963 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:22:32.452227116 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:22:32.495217085 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:22:52.766968012 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:22:52.772156954 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:22:53.188446999 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:22:53.385832071 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:04.031424999 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:04.040086985 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:04.285531998 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:04.495248079 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:04.978291988 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:04.987255096 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:05.355923891 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:05.479582071 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:15.447870970 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:15.493190050 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:15.854744911 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:15.995332956 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:22.843478918 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:22.848895073 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:23.079660892 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:23.182718992 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:26.339174032 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:26.353221893 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:26.657047987 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:26.792294979 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:34.144223928 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:34.149497032 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:37.122237921 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:37.182760000 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:41.089427948 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:41.182810068 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:42.034167051 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:42.182883978 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:50.459295034 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:50.464509964 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:50.656512022 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:50.662329912 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:50.706053019 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:50.792203903 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:23:50.936367989 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:23:50.995296001 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:24:19.218815088 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:24:19.225641966 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:19.495121002 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:19.682998896 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:24:24.971645117 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:24:24.976752043 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:29.727255106 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:24:29.752036095 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:31.260550022 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:31.479777098 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:24:34.692567110 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:34.694581032 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:34.694679022 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:24:42.038511038 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:42.089155912 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:24:46.938905001 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:24:46.944124937 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:47.228172064 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:47.292382956 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:24:51.988657951 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:24:52.248099089 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:52.528841972 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:24:52.682890892 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:26:09.705801964 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:26:09.721287012 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:26:16.228357077 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:26:16.292431116 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:26:16.360104084 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Jul 24, 2024 17:26:16.366570950 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:26:24.558083057 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:26:24.681227922 CEST | 80 | 49706 | 88.198.117.174 | 192.168.2.9 |
Jul 24, 2024 17:26:24.681317091 CEST | 49706 | 80 | 192.168.2.9 | 88.198.117.174 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 24, 2024 17:22:31.625720978 CEST | 58817 | 53 | 192.168.2.9 | 1.1.1.1 |
Jul 24, 2024 17:22:31.635876894 CEST | 53 | 58817 | 1.1.1.1 | 192.168.2.9 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jul 24, 2024 17:22:31.625720978 CEST | 192.168.2.9 | 1.1.1.1 | 0x6cb3 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jul 24, 2024 17:22:31.635876894 CEST | 1.1.1.1 | 192.168.2.9 | 0x6cb3 | No error (0) | 5.75.158.61 | A (IP address) | IN (0x0001) | false | ||
Jul 24, 2024 17:22:31.635876894 CEST | 1.1.1.1 | 192.168.2.9 | 0x6cb3 | No error (0) | 88.198.117.174 | A (IP address) | IN (0x0001) | false |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.9 | 49706 | 88.198.117.174 | 80 | 7040 | C:\Users\user\Desktop\xB6r0wPRyb.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jul 24, 2024 17:22:31.645807028 CEST | 565 | OUT | |
Jul 24, 2024 17:22:32.452227116 CEST | 413 | IN | |
Jul 24, 2024 17:22:52.766968012 CEST | 185 | OUT | |
Jul 24, 2024 17:22:53.188446999 CEST | 63 | IN | |
Jul 24, 2024 17:23:04.031424999 CEST | 185 | OUT | |
Jul 24, 2024 17:23:04.285531998 CEST | 63 | IN | |
Jul 24, 2024 17:23:04.978291988 CEST | 185 | OUT | |
Jul 24, 2024 17:23:05.355923891 CEST | 63 | IN | |
Jul 24, 2024 17:23:15.447870970 CEST | 185 | OUT | |
Jul 24, 2024 17:23:15.854744911 CEST | 63 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 11:22:26 |
Start date: | 24/07/2024 |
Path: | C:\Users\user\Desktop\xB6r0wPRyb.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff779200000 |
File size: | 23'395'348 bytes |
MD5 hash: | 16C310C40604C5CD011F47DEE2DB303A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 11:22:26 |
Start date: | 24/07/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff70f010000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 4 |
Start time: | 11:23:14 |
Start date: | 24/07/2024 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff77afe0000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|