Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Bootxr.exe

Overview

General Information

Sample name:Bootxr.exe
Analysis ID:1583288
MD5:7ab589a47833b37863bacfdf660f874a
SHA1:2ea872d3e93d4d71d49079530ccfab52e6424041
SHA256:24e46c0682aae430b13f11c5eda246242a43d689f9828298939e3302763096ae
Tags:exeuser-TeamDreier
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

Xmrig
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Yara detected Xmrig cryptocurrency miner
Machine Learning detection for sample
PE file overlay found
Uses 32bit PE files

Classification

NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
Bootxr.exeJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: http://45.125.67.168/stelin/xmrig.exeAvira URL Cloud: Label: malware
    Source: Bootxr.exeJoe Sandbox ML: detected

    Bitcoin Miner

    barindex
    Source: Yara matchFile source: Bootxr.exe, type: SAMPLE
    Source: Bootxr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Bootxr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: Z:\Fin\Release\Fin.pdb source: Bootxr.exe
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: time.windows.com
    Source: Bootxr.exeString found in binary or memory: http://45.125.67.168/stelin/xmrig.exe
    Source: Bootxr.exeStatic PE information: Data appended to the last section found
    Source: Bootxr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal60.mine.winEXE@0/0@1/0
    Source: Bootxr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: Bootxr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: Bootxr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: Bootxr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: Bootxr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Bootxr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: Bootxr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: Bootxr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Bootxr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: Z:\Fin\Release\Fin.pdb source: Bootxr.exe
    Source: Bootxr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: Bootxr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: Bootxr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: Bootxr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: Bootxr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
    Non-Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Bootxr.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://45.125.67.168/stelin/xmrig.exe100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    s-part-0017.t-0009.t-msedge.net
    13.107.246.45
    truefalse
      high
      time.windows.com
      unknown
      unknownfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://45.125.67.168/stelin/xmrig.exeBootxr.exefalse
        • Avira URL Cloud: malware
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1583288
        Start date and time:2025-01-02 10:56:11 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 1m 32s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Bootxr.exe
        Detection:MAL
        Classification:mal60.mine.winEXE@0/0@1/0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Unable to launch sample, stop analysis
        • No process behavior to analyse as no analysis process or sample was found
        • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
        • Exclude process from analysis (whitelisted): dllhost.exe, SgrmBroker.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 20.101.57.9, 13.107.246.45
        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, twc.trafficmanager.net, azureedge-t-prod.trafficmanager.net
        No simulations
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        s-part-0017.t-0009.t-msedge.netcici.exeGet hashmaliciousRedLineBrowse
        • 13.107.246.45
        intro.avi.exeGet hashmaliciousQuasarBrowse
        • 13.107.246.45
        random(6).exeGet hashmaliciousStealcBrowse
        • 13.107.246.45
        1.exeGet hashmaliciousXWormBrowse
        • 13.107.246.45
        installer64v7.1.0.msiGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        hcxmivKYfL.exeGet hashmaliciousRedLineBrowse
        • 13.107.246.45
        01012025.htmlGet hashmaliciousHTMLPhisherBrowse
        • 13.107.246.45
        http://l.instagram.com/?0bfd7a413579bfc47b11c1f19890162e=f171d759fb3a033e4eb430517cad3aef&e=ATP3gbWvTZYJbEDeh7rUkhPx4FjctqZcqx8JLHQOt3eCFNBI8ssZ853B2RmMWetLJ63KaZJU&s=1&u=https%3A%2F%2Fbusiness.instagram.com%2Fmicro_site%2Furl%2F%3Fevent_type%3Dclick%26site%3Digb%26destination%3Dhttps%253A%252F%252Fwww.facebook.com%252Fads%252Fig_redirect%252F%253Fd%253DAd8U5WMN2AM7K-NrvRBs3gyfr9DHeZ3ist33ENX9eJBJWMRBAaOOij4rbjtu42P4dXhL8YyD-jl0LZtS1wkFu-DRtZrPI1zyuzAYXXYv3uJfsc2GuuhHJZr0iVcLluY7-XzYStW8tPCtY7q5OaN0ZR5NezqONJHNCe212u1Fk3V5I6c8mMsj53lfF9nQIFCpMtE%2526a%253D1%2526hash%253DAd_y5usHyEC86F8XGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        https://t.co/YjyGioQuKTGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        installer64v9.3.4.msiGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):6.562071246237788
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:Bootxr.exe
        File size:209'046 bytes
        MD5:7ab589a47833b37863bacfdf660f874a
        SHA1:2ea872d3e93d4d71d49079530ccfab52e6424041
        SHA256:24e46c0682aae430b13f11c5eda246242a43d689f9828298939e3302763096ae
        SHA512:42d8451fb556c44872be12bc053b35617d7ae94a918cf880aa443114388407b671bea10f2eacc545a6263ec37c76466fdeea38a8c6d809836bff1e6695469ae5
        SSDEEP:3072:miC9j6h94pOCEAXZjjRbkspKUywXd5LJsNVQFGdFPHzcDq5OAg0Fuj0IpabX/FHi:miCDG4Bk/9IdzEQFGMAOtwX/FHi
        TLSH:0C147C217492C473D5B2153009F8EABA593EBD600F619AEF63D40B7E4F303C19A35A6B
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.kL>s..>s..>s..e...3s..e....s..e...(s..l.../s..l...*s..l...us..e...9s..>s..\s......?s......?s......?s..Rich>s..........PE..L..
        Icon Hash:00928e8e8686b000
        Entrypoint:0x407f27
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x6773CF56 [Tue Dec 31 11:02:46 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:a5eda6aa560c438e40024c6429fdd42a
        Instruction
        call 00007FEAE1303FBBh
        jmp 00007FEAE13036A9h
        mov ecx, dword ptr [ebp-0Ch]
        mov dword ptr fs:[00000000h], ecx
        pop ecx
        pop edi
        pop edi
        pop esi
        pop ebx
        mov esp, ebp
        pop ebp
        push ecx
        ret
        mov ecx, dword ptr [ebp-10h]
        xor ecx, ebp
        call 00007FEAE1303301h
        jmp 00007FEAE1303812h
        push eax
        push dword ptr fs:[00000000h]
        lea eax, dword ptr [esp+0Ch]
        sub esp, dword ptr [esp+0Ch]
        push ebx
        push esi
        push edi
        mov dword ptr [eax], ebp
        mov ebp, eax
        mov eax, dword ptr [00431014h]
        xor eax, ebp
        push eax
        push dword ptr [ebp-04h]
        mov dword ptr [ebp-04h], FFFFFFFFh
        lea eax, dword ptr [ebp-0Ch]
        mov dword ptr fs:[00000000h], eax
        ret
        push eax
        push dword ptr fs:[00000000h]
        lea eax, dword ptr [esp+0Ch]
        sub esp, dword ptr [esp+0Ch]
        push ebx
        push esi
        push edi
        mov dword ptr [eax], ebp
        mov ebp, eax
        mov eax, dword ptr [00431014h]
        xor eax, ebp
        push eax
        mov dword ptr [ebp-10h], eax
        push dword ptr [ebp-04h]
        mov dword ptr [ebp-04h], FFFFFFFFh
        lea eax, dword ptr [ebp-0Ch]
        mov dword ptr fs:[00000000h], eax
        ret
        push eax
        push dword ptr fs:[00000000h]
        lea eax, dword ptr [esp+0Ch]
        sub esp, dword ptr [esp+0Ch]
        push ebx
        push esi
        push edi
        mov dword ptr [eax], ebp
        mov ebp, eax
        mov eax, dword ptr [00431014h]
        xor eax, ebp
        push eax
        mov dword ptr [ebp-10h], esp
        push dword ptr [ebp-04h]
        mov dword ptr [ebp-04h], FFFFFFFFh
        lea eax, dword ptr [ebp-0Ch]
        mov dword ptr fs:[00000000h], eax
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x305900x50.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x330000x1e0.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x340000x1c54.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x2e5c00x70.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2e6300x40.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x230000x164.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x21e840x22000970eff4352ef9d38a383d26b54db5f1bFalse0.5773207720588235data6.644242851263365IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x230000xdd920xde00d3c809d1035a4af3c772000998c09630False0.5210796734234234Applesoft BASIC program data, first line number 35.547236216358552IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x310000x1cb80x1000ab032408688a8d7708da8c224987ed77False0.19140625DOS executable (block device driver \377\377\377\377\261)3.009522331722661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x330000x1e00x2007d123d6987b6fa0f191e9ee2fb0d9484False0.52734375data4.7113407225994175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x340000x1c540x1e00f1288daef7538b4fb8a23cae4197dda1False0.7459688439464335data6.523951668759212IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_MANIFEST0x330600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
        DLLImport
        KERNEL32.dllCloseHandle, CreateProcessW, GetLastError, HeapSize, SetStdHandle, Sleep, GetFileAttributesW, WaitForSingleObject, GetModuleFileNameW, CreateFileW, CreateDirectoryW, WideCharToMultiByte, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, MultiByteToWideChar, LCMapStringEx, GetStringTypeW, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, RaiseException, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetStdHandle, WriteFile, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, GetFileType, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, FlushFileBuffers, GetConsoleCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetProcessHeap, WriteConsoleW
        USER32.dllwsprintfW
        ADVAPI32.dllRegSetValueExW, RegOpenKeyExW, RegCreateKeyW, RegQueryValueExW, RegCloseKey
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampSource PortDest PortSource IPDest IP
        Jan 2, 2025 10:57:15.005137920 CET6334453192.168.2.71.1.1.1
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jan 2, 2025 10:57:15.005137920 CET192.168.2.71.1.1.10x29bStandard query (0)time.windows.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 2, 2025 10:57:14.356626987 CET1.1.1.1192.168.2.70xb3c6No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
        Jan 2, 2025 10:57:14.356626987 CET1.1.1.1192.168.2.70xb3c6No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
        Jan 2, 2025 10:57:15.012042046 CET1.1.1.1192.168.2.70x29bNo error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
        No statistics
        No system behavior
        No disassembly