Overview
overview
10Static
static
10xmrig-6.18...64.zip
windows7-x64
1xmrig-6.18...64.zip
windows10-2004-x64
1xmrig-6.18...56SUMS
windows7-x64
1xmrig-6.18...56SUMS
windows10-2004-x64
1xmrig-6.18...64.exe
windows7-x64
xmrig-6.18...64.exe
windows10-2004-x64
xmrig-6.18...0M.cmd
windows7-x64
1xmrig-6.18...0M.cmd
windows10-2004-x64
1xmrig-6.18...1M.cmd
windows7-x64
1xmrig-6.18...1M.cmd
windows10-2004-x64
1xmrig-6.18...g.json
windows7-x64
3xmrig-6.18...g.json
windows10-2004-x64
3xmrig-6.18...le.cmd
windows7-x64
1xmrig-6.18...le.cmd
windows10-2004-x64
1xmrig-6.18...le.cmd
windows7-x64
1xmrig-6.18...le.cmd
windows10-2004-x64
1xmrig-6.18...le.cmd
windows7-x64
1xmrig-6.18...le.cmd
windows10-2004-x64
1xmrig-6.18...rt.cmd
windows7-x64
1xmrig-6.18...rt.cmd
windows10-2004-x64
1xmrig-6.18...ig.exe
windows7-x64
1xmrig-6.18...ig.exe
windows10-2004-x64
1Analysis
-
max time kernel
30s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
31-12-2022 23:24
Behavioral task
behavioral1
Sample
xmrig-6.18.1-gcc-win64.zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
xmrig-6.18.1-gcc-win64.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
xmrig-6.18.1/SHA256SUMS
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
xmrig-6.18.1/SHA256SUMS
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
xmrig-6.18.1/WinRing0x64.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
xmrig-6.18.1/WinRing0x64.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
xmrig-6.18.1/benchmark_10M.cmd
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
xmrig-6.18.1/benchmark_10M.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
xmrig-6.18.1/benchmark_1M.cmd
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
xmrig-6.18.1/benchmark_1M.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
xmrig-6.18.1/config.json
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
xmrig-6.18.1/config.json
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
xmrig-6.18.1/pool_mine_example.cmd
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
xmrig-6.18.1/pool_mine_example.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
xmrig-6.18.1/rtm_ghostrider_example.cmd
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
xmrig-6.18.1/rtm_ghostrider_example.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
xmrig-6.18.1/solo_mine_example.cmd
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
xmrig-6.18.1/solo_mine_example.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
xmrig-6.18.1/start.cmd
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
xmrig-6.18.1/start.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
xmrig-6.18.1/xmrig.exe
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
xmrig-6.18.1/xmrig.exe
Resource
win10v2004-20221111-en
General
-
Target
xmrig-6.18.1/start.cmd
-
Size
29B
-
MD5
6eb783bc229f92d0f8285500928ac8a1
-
SHA1
c2740b6e8a535176e3df92c0417ef1a4d5e1bc46
-
SHA256
9554e811347798d784bbe0ed5fa212e95dc8783a34cbc298454805f0988cb577
-
SHA512
f9019e39e93f627873a9def844f4f8bce8cc49f0b757181bd2c06b30d24b75332ffc921d073f2c2481794a5cf0d507564e265e5e40585e090105b882873b1575
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1120 xmrig.exe Token: SeLockMemoryPrivilege 1120 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1120 xmrig.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1120 1808 cmd.exe 29 PID 1808 wrote to memory of 1120 1808 cmd.exe 29 PID 1808 wrote to memory of 1120 1808 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\xmrig-6.18.1\start.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\xmrig-6.18.1\xmrig.exexmrig.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1120
-