Analysis

  • max time kernel
    1608s
  • max time network
    1789s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2023 10:08

General

  • Target

    xmrig-6.18.1/start.cmd

  • Size

    114B

  • MD5

    65998d14620c992b93829f7645e70c3c

  • SHA1

    76ea5f5a042107537924016a2ecd6b6f74a84723

  • SHA256

    3f365a5538aacdaf4781b79e632b013b7ffb5cd31785a8afb3eccf07e52f630d

  • SHA512

    215c5c4f089e77e255baa2097fbb7ffa5f4289f0bf0a035a8b52ea1ce7b41a7db9e3e459ea2cc3fc5d3b2e1ba2b8db291a55a6b535ac7aa4f8dfa01c0a1cfa31

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\xmrig-6.18.1\start.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Users\Admin\AppData\Local\Temp\xmrig-6.18.1\xmrig.exe
      xmrig.exe -o rx.unmineable.com:3333 -a rx -k -u DASH:XpDwRaXXCzsyJPQQEydzzdrnPuccK3GDmL.YKCG -p x
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1560

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1560-54-0x0000000000000000-mapping.dmp

  • memory/1560-55-0x0000000001C20000-0x0000000001C40000-memory.dmp

    Filesize

    128KB

  • memory/1560-56-0x0000000000000000-0x0000000001000000-memory.dmp

    Filesize

    16.0MB