Overview
overview
10Static
static
10SysApps.rar
windows10-2004-x64
3SysApps/SHA256SUMS
windows10-2004-x64
1SysApps/Wi...64.exe
windows10-2004-x64
SysApps/be...0M.cmd
windows10-2004-x64
1SysApps/be...1M.cmd
windows10-2004-x64
1SysApps/config.json
windows10-2004-x64
3SysApps/po...le.cmd
windows10-2004-x64
1SysApps/rt...le.cmd
windows10-2004-x64
1SysApps/so...le.cmd
windows10-2004-x64
1SysApps/start.cmd
windows10-2004-x64
5SysApps/xmrig.exe
windows10-2004-x64
1Analysis
-
max time kernel
1409s -
max time network
1795s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2023 19:16
Behavioral task
behavioral1
Sample
SysApps.rar
Resource
win10v2004-20221111-en
Behavioral task
behavioral2
Sample
SysApps/SHA256SUMS
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
SysApps/WinRing0x64.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
SysApps/benchmark_10M.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
SysApps/benchmark_1M.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral6
Sample
SysApps/config.json
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
SysApps/pool_mine_example.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
SysApps/rtm_ghostrider_example.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
SysApps/solo_mine_example.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral10
Sample
SysApps/start.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
SysApps/xmrig.exe
Resource
win10v2004-20221111-en
General
-
Target
SysApps/xmrig.exe
-
Size
7.8MB
-
MD5
6f4532e49d65c2be0355b222f96e06e8
-
SHA1
268e90ce25e01bbb205f6ae3f493f8da36a61480
-
SHA256
acaf8e844ef7f4f65033ebe9546c394cc21bce175dac8b59199106309f04e5ab
-
SHA512
85f495b0bbd0673df376f44e912f9a0a8d201c2843f1a9efa64d93703a2d8ba2b6fa2638a747e79604715d26ddfc07de26ba43d03adf86290d928b442bf09207
-
SSDEEP
98304:D8sOUckgBwr4UyuwShsa+XbcDVa2+N/qyRiXM71ZQkcn4CuJ9KWZVxBJNxg/F5MB:vYwr/xU3rDXWMc85j4eEsoCSCwG
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 644 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4280 xmrig.exe Token: SeLockMemoryPrivilege 4280 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4280 xmrig.exe