Overview
overview
10Static
static
10ac442c192a...98.zip
windows10-2004-x64
1xmrig-6.21...56SUMS
windows10-2004-x64
1xmrig-6.21...64.sys
windows10-2004-x64
1xmrig-6.21...0M.cmd
windows10-2004-x64
1xmrig-6.21...1M.cmd
windows10-2004-x64
1xmrig-6.21...g.json
windows10-2004-x64
3xmrig-6.21...le.cmd
windows10-2004-x64
1xmrig-6.21...le.cmd
windows10-2004-x64
1xmrig-6.21...le.cmd
windows10-2004-x64
1xmrig-6.21...rt.cmd
windows10-2004-x64
1xmrig-6.21...ig.exe
windows10-2004-x64
1Analysis
-
max time kernel
224s -
max time network
283s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 06:47
Behavioral task
behavioral1
Sample
ac442c192a538aceb2802adb3c72d4e7fe781f84f8b21adf0f9d87f0314bae98.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
xmrig-6.21.2/SHA256SUMS
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
xmrig-6.21.2/WinRing0x64.sys
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
xmrig-6.21.2/benchmark_10M.cmd
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
xmrig-6.21.2/benchmark_1M.cmd
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
xmrig-6.21.2/config.json
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
xmrig-6.21.2/pool_mine_example.cmd
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
xmrig-6.21.2/rtm_ghostrider_example.cmd
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
xmrig-6.21.2/solo_mine_example.cmd
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
xmrig-6.21.2/start.cmd
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
xmrig-6.21.2/xmrig.exe
Resource
win10v2004-20240412-en
General
-
Target
xmrig-6.21.2/benchmark_1M.cmd
-
Size
60B
-
MD5
cba1927cf6959dc99ecbd0c553e4db6f
-
SHA1
7f2d59cfdf2b0550d22ac54d0b1fa5ac8f8b5f57
-
SHA256
d7747e7a3c782009f4ceb6e9c106115876386853929563b509da5258e3968d15
-
SHA512
c78ab9b017153c497ef2d0f568ade265ae9b60238ebdb36d8ef7ecc4d232cd90fd5fdc5b600bb26437466c7300e571b95b4ff92a7f024a981a02196a14d6e3f1
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4484 xmrig.exe Token: SeLockMemoryPrivilege 4484 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4484 xmrig.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3016 wrote to memory of 4484 3016 cmd.exe 85 PID 3016 wrote to memory of 4484 3016 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.2\benchmark_1M.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.2\xmrig.exexmrig.exe --bench=1M --submit2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4484
-