Analysis
-
max time kernel
1626s -
max time network
1791s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/01/2023, 15:28
Behavioral task
behavioral1
Sample
xmrig-6.18.1/start.cmd
Resource
win7-20220901-en
4 signatures
1800 seconds
Behavioral task
behavioral2
Sample
xmrig-6.18.1/start.cmd
Resource
win10v2004-20220812-en
4 signatures
1800 seconds
General
-
Target
xmrig-6.18.1/start.cmd
-
Size
113B
-
MD5
34af0052c5617f182798dee7c7e4e4e1
-
SHA1
b1359e72828cdddb87cdbdfa46e3a79f97cfddac
-
SHA256
c31ff3e6d1dc5f0555b4c4823205fb44ecd2a2b56a978bddcb33faceae024758
-
SHA512
00037ae09c97981302d95536a0cda03dc7e6e00fe84f60e14f037b69ef0a7ea68e2767afdd767ef002b7649aa366291e8841d793e29889a62e708c79c99c8c4c
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1688 xmrig.exe Token: SeLockMemoryPrivilege 1688 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 xmrig.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1688 1732 cmd.exe 28 PID 1732 wrote to memory of 1688 1732 cmd.exe 28 PID 1732 wrote to memory of 1688 1732 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\xmrig-6.18.1\start.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\xmrig-6.18.1\xmrig.exexmrig.exe -o rx.unmineable.com:3333 -a rx -k -u RVN:RMHmiB3nPeiynSRpiKyEPZGgWqvjK6JT7r.YKCG -p x2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1688
-