Analysis
-
max time kernel
1624s -
max time network
1799s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-01-2023 14:44
Behavioral task
behavioral1
Sample
xmrig-6.18.1/start.cmd
Resource
win7-20221111-en
windows7-x64
4 signatures
1800 seconds
Behavioral task
behavioral2
Sample
xmrig-6.18.1/start.cmd
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
1800 seconds
General
-
Target
xmrig-6.18.1/start.cmd
-
Size
113B
-
MD5
34af0052c5617f182798dee7c7e4e4e1
-
SHA1
b1359e72828cdddb87cdbdfa46e3a79f97cfddac
-
SHA256
c31ff3e6d1dc5f0555b4c4823205fb44ecd2a2b56a978bddcb33faceae024758
-
SHA512
00037ae09c97981302d95536a0cda03dc7e6e00fe84f60e14f037b69ef0a7ea68e2767afdd767ef002b7649aa366291e8841d793e29889a62e708c79c99c8c4c
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2016 xmrig.exe Token: SeLockMemoryPrivilege 2016 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 xmrig.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2016 1684 cmd.exe 29 PID 1684 wrote to memory of 2016 1684 cmd.exe 29 PID 1684 wrote to memory of 2016 1684 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\xmrig-6.18.1\start.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\xmrig-6.18.1\xmrig.exexmrig.exe -o rx.unmineable.com:3333 -a rx -k -u RVN:RMHmiB3nPeiynSRpiKyEPZGgWqvjK6JT7r.YKCG -p x2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2016
-