Analysis
-
max time kernel
122s -
max time network
289s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 10:29
Behavioral task
behavioral1
Sample
testx2-main/WinRing0x64.sys
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
testx2-main/WinRing0x64.sys
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
testx2-main/xmrigDaemon.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
testx2-main/xmrigDaemon.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
testx2-main/xmrigMiner.exe
Behavioral task
behavioral6
Sample
testx2-main/xmrigMiner.exe
General
-
Target
testx2-main/xmrigDaemon.exe
-
Size
362KB
-
MD5
b16954807827ccfa1e4738fce1089b62
-
SHA1
b2f6607d68e4d197892c515b16b3f61252304120
-
SHA256
2f8c68901f8df6f67796a8a892dd517c2011b93f271da04ed55448e9686ad984
-
SHA512
48726f50886b81a08317a0db0171ae3264880d43514086766e3f9a354b59101cf0755f8d815ad6979eab8c7fcc62969ff977ed9d780f30323f6143697869c0ed
-
SSDEEP
6144:eluUm0Yxw8f9ZzJ83K1woh8iMFJrCK1vHkk:eIUmXw29EYwoip
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2636 xmrigMiner.exe Token: SeLockMemoryPrivilege 2636 xmrigMiner.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 xmrigMiner.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2760 3064 xmrigDaemon.exe 29 PID 3064 wrote to memory of 2760 3064 xmrigDaemon.exe 29 PID 3064 wrote to memory of 2760 3064 xmrigDaemon.exe 29 PID 2760 wrote to memory of 2636 2760 cmd.exe 30 PID 2760 wrote to memory of 2636 2760 cmd.exe 30 PID 2760 wrote to memory of 2636 2760 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigDaemon.exe"C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigDaemon.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exe" --daemonized2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exeC:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exe --daemonized3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2636
-
-