Report - tomcaterror.bmpqoq

XMRig Miner Generic Malware Malicious Packer Malicious Library UPX PE File PE64 OS Processor Check
ScreenShot
Created 2025.04.29 17:04 Machine s1_win7_x6403
Filename tomcaterror.bmpqoq
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
1
Behavior Score
3.6
ZERO API file : clean
VT API (file) 34 detected (AIDetectMalware, Miner, Coinminer, Lazy, Unsafe, malicious, confidence, Attribute, HighConfidence, score, PotentialRisk, Static AI, Malicious PE, DisguisedXMRigMiner, Detected, Miner3, R472641, Vmprotect, HackTool, XmrigGo)
md5 467d1d12df433e5f6bb45998f05d99df
sha256 91f71f655004eb5e2783a98f7556c5e0e58d4f438fd5d2dcdf9e522735cf09b9
ssdeep 98304:HPWAAX3vGNYvdIiYTAL2gMlrV++ytwh+T0QEEr+HZTLVIhJBN68:HgX3k7ytw0T0A+HZTROj68
imphash a346f1de2922750a7e7b73eb9c762422
impfuzzy 96:thQ45LtLULX1oj3cpejwgfTdkIVr8gkeY4DQzX7tGBgiM3DQnWXqoowrbnshXJg:I45GFWbwodkIVVDQzuXECWZrb2XW
  Network IP location

Signature (8cnts)

Level Description
danger File has been identified by 34 AntiVirus engines on VirusTotal as malicious
watch Created a service where a service was also not started
watch Detects Virtual Machines through their custom firmware
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
info Checks amount of memory in system
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (8cnts)

Level Name Description Collection
danger XMRig_Miner_IN XMRig Miner binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
pool.hashvault.pro SG OVH SAS 51.79.163.234 mailcious
51.79.163.234 SG OVH SAS 51.79.163.234 clean

Suricata ids

PE API

IAT(Import Address Table) Library

WS2_32.dll
 0x14037e8c0 ntohs
 0x14037e8c8 recv
 0x14037e8d0 send
 0x14037e8d8 WSASetLastError
 0x14037e8e0 htons
 0x14037e8e8 WSARecv
 0x14037e8f0 WSAGetLastError
 0x14037e8f8 select
 0x14037e900 WSARecvFrom
 0x14037e908 WSASocketW
 0x14037e910 WSASend
 0x14037e918 gethostname
 0x14037e920 WSAIoctl
 0x14037e928 WSADuplicateSocketW
 0x14037e930 shutdown
 0x14037e938 getpeername
 0x14037e940 FreeAddrInfoW
 0x14037e948 GetAddrInfoW
 0x14037e950 htonl
 0x14037e958 socket
 0x14037e960 setsockopt
 0x14037e968 listen
 0x14037e970 closesocket
 0x14037e978 ind
 0x14037e980 WSACleanup
 0x14037e988 WSAStartup
 0x14037e990 getsockopt
 0x14037e998 getsockname
 0x14037e9a0 ioctlsocket
PSAPI.DLL
 0x14037e838 GetProcessMemoryInfo
IPHLPAPI.DLL
 0x14037e150 GetAdaptersAddresses
USERENV.dll
 0x14037e8b0 GetUserProfileDirectoryW
CRYPT32.dll
 0x14037e110 CertGetCertificateContextProperty
 0x14037e118 CertOpenStore
 0x14037e120 CertCloseStore
 0x14037e128 CertEnumCertificatesInStore
 0x14037e130 CertFreeCertificateContext
 0x14037e138 CertDuplicateCertificateContext
 0x14037e140 CertFindCertificateInStore
KERNEL32.dll
 0x14037e160 GetStdHandle
 0x14037e168 SetConsoleMode
 0x14037e170 GetConsoleMode
 0x14037e178 QueryPerformanceFrequency
 0x14037e180 QueryPerformanceCounter
 0x14037e188 SizeofResource
 0x14037e190 LockResource
 0x14037e198 LoadResource
 0x14037e1a0 FindResourceW
 0x14037e1a8 ExpandEnvironmentStringsA
 0x14037e1b0 GetConsoleWindow
 0x14037e1b8 GetSystemFirmwareTable
 0x14037e1c0 HeapFree
 0x14037e1c8 HeapAlloc
 0x14037e1d0 GetProcessHeap
 0x14037e1d8 MultiByteToWideChar
 0x14037e1e0 SetPriorityClass
 0x14037e1e8 GetCurrentProcess
 0x14037e1f0 SetThreadPriority
 0x14037e1f8 GetSystemPowerStatus
 0x14037e200 GetCurrentThread
 0x14037e208 GetProcAddress
 0x14037e210 GetModuleHandleW
 0x14037e218 GetTickCount
 0x14037e220 CloseHandle
 0x14037e228 FreeConsole
 0x14037e230 VirtualProtect
 0x14037e238 VirtualFree
 0x14037e240 VirtualAlloc
 0x14037e248 GetLargePageMinimum
 0x14037e250 LocalAlloc
 0x14037e258 GetLastError
 0x14037e260 LocalFree
 0x14037e268 FlushInstructionCache
 0x14037e270 GetCurrentThreadId
 0x14037e278 AddVectoredExceptionHandler
 0x14037e280 DeviceIoControl
 0x14037e288 GetModuleFileNameW
 0x14037e290 CreateFileW
 0x14037e298 SetLastError
 0x14037e2a0 GetSystemTime
 0x14037e2a8 SystemTimeToFileTime
 0x14037e2b0 GetModuleHandleExW
 0x14037e2b8 EnterCriticalSection
 0x14037e2c0 LeaveCriticalSection
 0x14037e2c8 InitializeCriticalSectionAndSpinCount
 0x14037e2d0 DeleteCriticalSection
 0x14037e2d8 TlsAlloc
 0x14037e2e0 TlsGetValue
 0x14037e2e8 TlsSetValue
 0x14037e2f0 TlsFree
 0x14037e2f8 SwitchToFiber
 0x14037e300 DeleteFiber
 0x14037e308 CreateFiber
 0x14037e310 FindClose
 0x14037e318 FindFirstFileW
 0x14037e320 FindNextFileW
 0x14037e328 WideCharToMultiByte
 0x14037e330 GetFileType
 0x14037e338 WriteFile
 0x14037e340 ConvertFiberToThread
 0x14037e348 ConvertThreadToFiber
 0x14037e350 GetCurrentProcessId
 0x14037e358 GetSystemTimeAsFileTime
 0x14037e360 FreeLibrary
 0x14037e368 LoadLibraryA
 0x14037e370 LoadLibraryW
 0x14037e378 GetEnvironmentVariableW
 0x14037e380 ReadConsoleA
 0x14037e388 ReadConsoleW
 0x14037e390 PostQueuedCompletionStatus
 0x14037e398 CreateFileA
 0x14037e3a0 DuplicateHandle
 0x14037e3a8 SetEvent
 0x14037e3b0 ResetEvent
 0x14037e3b8 WaitForSingleObject
 0x14037e3c0 CreateEventA
 0x14037e3c8 Sleep
 0x14037e3d0 QueueUserWorkItem
 0x14037e3d8 RegisterWaitForSingleObject
 0x14037e3e0 UnregisterWait
 0x14037e3e8 GetNumberOfConsoleInputEvents
 0x14037e3f0 ReadConsoleInputW
 0x14037e3f8 FillConsoleOutputCharacterW
 0x14037e400 FillConsoleOutputAttribute
 0x14037e408 GetConsoleCursorInfo
 0x14037e410 SetConsoleCursorInfo
 0x14037e418 GetConsoleScreenBufferInfo
 0x14037e420 SetConsoleCursorPosition
 0x14037e428 SetConsoleTextAttribute
 0x14037e430 WriteConsoleInputW
 0x14037e438 CreateDirectoryW
 0x14037e440 FlushFileBuffers
 0x14037e448 GetDiskFreeSpaceW
 0x14037e450 SetConsoleTitleA
 0x14037e458 WriteConsoleW
 0x14037e460 GetFileSizeEx
 0x14037e468 GetFinalPathNameByHandleW
 0x14037e470 GetFullPathNameW
 0x14037e478 ReadFile
 0x14037e480 RemoveDirectoryW
 0x14037e488 SetFilePointerEx
 0x14037e490 SetFileTime
 0x14037e498 GetSystemInfo
 0x14037e4a0 MapViewOfFile
 0x14037e4a8 FlushViewOfFile
 0x14037e4b0 UnmapViewOfFile
 0x14037e4b8 CreateFileMappingA
 0x14037e4c0 ReOpenFile
 0x14037e4c8 CopyFileW
 0x14037e4d0 MoveFileExW
 0x14037e4d8 CreateHardLinkW
 0x14037e4e0 GetFileInformationByHandleEx
 0x14037e4e8 CreateSymbolicLinkW
 0x14037e4f0 InitializeCriticalSection
 0x14037e4f8 TryEnterCriticalSection
 0x14037e500 InitializeConditionVariable
 0x14037e508 WakeConditionVariable
 0x14037e510 WakeAllConditionVariable
 0x14037e518 SleepConditionVariableCS
 0x14037e520 ReleaseSemaphore
 0x14037e528 ResumeThread
 0x14037e530 GetNativeSystemInfo
 0x14037e538 CreateSemaphoreA
 0x14037e540 SetConsoleCtrlHandler
 0x14037e548 GetCurrentDirectoryW
 0x14037e550 GetLongPathNameW
 0x14037e558 GetShortPathNameW
 0x14037e560 CreateIoCompletionPort
 0x14037e568 ReadDirectoryChangesW
 0x14037e570 VerSetConditionMask
 0x14037e578 GetEnvironmentStringsW
 0x14037e580 FreeEnvironmentStringsW
 0x14037e588 SetEnvironmentVariableW
 0x14037e590 RtlUnwind
 0x14037e598 GetTempPathW
 0x14037e5a0 GlobalMemoryStatusEx
 0x14037e5a8 VerifyVersionInfoA
 0x14037e5b0 FileTimeToSystemTime
 0x14037e5b8 SetHandleInformation
 0x14037e5c0 CancelIo
 0x14037e5c8 SetFileCompletionNotificationModes
 0x14037e5d0 LoadLibraryExW
 0x14037e5d8 FormatMessageA
 0x14037e5e0 SetErrorMode
 0x14037e5e8 GetQueuedCompletionStatus
 0x14037e5f0 ConnectNamedPipe
 0x14037e5f8 PeekNamedPipe
 0x14037e600 CreateNamedPipeW
 0x14037e608 CancelIoEx
 0x14037e610 CancelSynchronousIo
 0x14037e618 SwitchToThread
 0x14037e620 TerminateProcess
 0x14037e628 GetExitCodeProcess
 0x14037e630 UnregisterWaitEx
 0x14037e638 LCMapStringW
 0x14037e640 DebugBreak
 0x14037e648 GetModuleHandleA
 0x14037e650 GetStartupInfoW
 0x14037e658 GetModuleFileNameA
 0x14037e660 GetVersionExA
 0x14037e668 GetProcessAffinityMask
 0x14037e670 SetProcessAffinityMask
 0x14037e678 SetThreadAffinityMask
 0x14037e680 GetComputerNameA
 0x14037e688 RtlLookupFunctionEntry
 0x14037e690 RtlCaptureContext
 0x14037e698 CreateEventW
 0x14037e6a0 GetStringTypeW
 0x14037e6a8 RtlVirtualUnwind
 0x14037e6b0 GetFileInformationByHandle
 0x14037e6b8 UnhandledExceptionFilter
 0x14037e6c0 SetUnhandledExceptionFilter
 0x14037e6c8 IsProcessorFeaturePresent
 0x14037e6d0 IsDebuggerPresent
 0x14037e6d8 InitializeSListHead
 0x14037e6e0 RtlUnwindEx
 0x14037e6e8 RtlPcToFileHeader
 0x14037e6f0 RaiseException
 0x14037e6f8 SetStdHandle
 0x14037e700 GetCommandLineA
 0x14037e708 GetCommandLineW
 0x14037e710 CreateThread
 0x14037e718 ExitThread
 0x14037e720 FreeLibraryAndExitThread
 0x14037e728 GetDriveTypeW
 0x14037e730 SystemTimeToTzSpecificLocalTime
 0x14037e738 ExitProcess
 0x14037e740 GetFileAttributesExW
 0x14037e748 SetFileAttributesW
 0x14037e750 GetConsoleOutputCP
 0x14037e758 CompareStringW
 0x14037e760 GetLocaleInfoW
 0x14037e768 IsValidLocale
 0x14037e770 GetUserDefaultLCID
 0x14037e778 EnumSystemLocalesW
 0x14037e780 HeapReAlloc
 0x14037e788 GetTimeZoneInformation
 0x14037e790 HeapSize
 0x14037e798 SetEndOfFile
 0x14037e7a0 FindFirstFileExW
 0x14037e7a8 IsValidCodePage
 0x14037e7b0 GetACP
 0x14037e7b8 GetOEMCP
 0x14037e7c0 GetFileAttributesW
 0x14037e7c8 SetCurrentDirectoryW
 0x14037e7d0 InitializeSRWLock
 0x14037e7d8 ReleaseSRWLockExclusive
 0x14037e7e0 AcquireSRWLockExclusive
 0x14037e7e8 InitializeCriticalSectionEx
 0x14037e7f0 WaitForSingleObjectEx
 0x14037e7f8 GetExitCodeThread
 0x14037e800 SleepConditionVariableSRW
 0x14037e808 EncodePointer
 0x14037e810 DecodePointer
 0x14037e818 LCMapStringEx
 0x14037e820 CompareStringEx
 0x14037e828 GetCPInfo
USER32.dll
 0x14037e858 GetProcessWindowStation
 0x14037e860 ShowWindow
 0x14037e868 GetLastInputInfo
 0x14037e870 GetUserObjectInformationW
 0x14037e878 GetSystemMetrics
 0x14037e880 MapVirtualKeyW
 0x14037e888 DispatchMessageA
 0x14037e890 TranslateMessage
 0x14037e898 GetMessageA
 0x14037e8a0 MessageBoxW
SHELL32.dll
 0x14037e848 SHGetSpecialFolderPathA
ole32.dll
 0x14037e9c0 CoInitializeEx
 0x14037e9c8 CoCreateInstance
 0x14037e9d0 CoUninitialize
ADVAPI32.dll
 0x14037e000 SystemFunction036
 0x14037e008 GetUserNameW
 0x14037e010 CryptEnumProvidersW
 0x14037e018 CryptSignHashW
 0x14037e020 CryptDestroyHash
 0x14037e028 CryptCreateHash
 0x14037e030 CryptDecrypt
 0x14037e038 CryptExportKey
 0x14037e040 CryptGetUserKey
 0x14037e048 CryptGetProvParam
 0x14037e050 CryptSetHashParam
 0x14037e058 CryptDestroyKey
 0x14037e060 CryptReleaseContext
 0x14037e068 CryptAcquireContextW
 0x14037e070 ReportEventW
 0x14037e078 RegisterEventSourceW
 0x14037e080 DeregisterEventSource
 0x14037e088 CreateServiceW
 0x14037e090 QueryServiceStatus
 0x14037e098 CloseServiceHandle
 0x14037e0a0 OpenSCManagerW
 0x14037e0a8 QueryServiceConfigA
 0x14037e0b0 DeleteService
 0x14037e0b8 ControlService
 0x14037e0c0 StartServiceW
 0x14037e0c8 OpenServiceW
 0x14037e0d0 LookupPrivilegeValueW
 0x14037e0d8 AdjustTokenPrivileges
 0x14037e0e0 OpenProcessToken
 0x14037e0e8 LsaOpenPolicy
 0x14037e0f0 LsaAddAccountRights
 0x14037e0f8 LsaClose
 0x14037e100 GetTokenInformation
crypt.dll
 0x14037e9b0 BCryptGenRandom

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure