Analysis
-
max time kernel
1800s -
max time network
1784s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2023 19:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
zx.exe
Resource
win7-20230712-en
windows7-x64
8 signatures
1800 seconds
General
-
Target
zx.exe
-
Size
5.4MB
-
MD5
00ddee7f37fc5e215a882fc4087dbddc
-
SHA1
d037493f7241be289fe2bda32463fce91fe1b0ba
-
SHA256
ee29c2f2024806574391a1da48d9e38575cc93f9cbf57c9778e0e9bd7af5c45b
-
SHA512
ea8d2690bd262f7e31491851fad63f1df02e7c898d27b4b6cc17a91862b7209ad198c91793d30370c9a6f0d5c6c46105c4a2b43a9794091b9bff9f089fc48f2b
-
SSDEEP
98304:JSsnkpppRTS1x+fxxPC1NiUySli0QRG3GybVfxSM:J5nwpzgx+5s1MBYQY3Gyhfx
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3124 created 3172 3124 zx.exe 36 -
XMRig Miner payload 62 IoCs
resource yara_rule behavioral2/memory/3124-136-0x00007FF7B47F0000-0x00007FF7B4D65000-memory.dmp xmrig behavioral2/memory/3996-139-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-142-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-145-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-146-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-147-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-148-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-149-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-150-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-151-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-152-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-153-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-154-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-155-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-156-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-157-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-158-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-159-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-160-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-161-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-162-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-167-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-168-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-169-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-170-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-171-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-172-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-173-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-174-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-175-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-176-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-177-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-178-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-179-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-180-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-181-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-182-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-183-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-184-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-185-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-186-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-187-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-188-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-189-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-190-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-191-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-192-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-193-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-194-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-195-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-196-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-197-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-198-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-199-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-200-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-201-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-202-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-203-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-204-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-205-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-206-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig behavioral2/memory/3996-207-0x00007FF703080000-0x00007FF70386F000-memory.dmp xmrig -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3124 set thread context of 3996 3124 zx.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3124 zx.exe 3124 zx.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 3996 explorer.exe Token: SeLockMemoryPrivilege 3996 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 3124 wrote to memory of 3996 3124 zx.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\zx.exe"C:\Users\Admin\AppData\Local\Temp\zx.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3124
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3996
-