Analysis
-
max time kernel
95s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 10:29
Behavioral task
behavioral1
Sample
testx2-main/WinRing0x64.sys
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
testx2-main/WinRing0x64.sys
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
testx2-main/xmrigDaemon.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
testx2-main/xmrigDaemon.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
testx2-main/xmrigMiner.exe
Behavioral task
behavioral6
Sample
testx2-main/xmrigMiner.exe
General
-
Target
testx2-main/xmrigDaemon.exe
-
Size
362KB
-
MD5
b16954807827ccfa1e4738fce1089b62
-
SHA1
b2f6607d68e4d197892c515b16b3f61252304120
-
SHA256
2f8c68901f8df6f67796a8a892dd517c2011b93f271da04ed55448e9686ad984
-
SHA512
48726f50886b81a08317a0db0171ae3264880d43514086766e3f9a354b59101cf0755f8d815ad6979eab8c7fcc62969ff977ed9d780f30323f6143697869c0ed
-
SSDEEP
6144:eluUm0Yxw8f9ZzJ83K1woh8iMFJrCK1vHkk:eIUmXw29EYwoip
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4012 xmrigMiner.exe Token: SeLockMemoryPrivilege 4012 xmrigMiner.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4012 xmrigMiner.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4888 wrote to memory of 2400 4888 xmrigDaemon.exe 83 PID 4888 wrote to memory of 2400 4888 xmrigDaemon.exe 83 PID 2400 wrote to memory of 4012 2400 cmd.exe 84 PID 2400 wrote to memory of 4012 2400 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigDaemon.exe"C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigDaemon.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exe" --daemonized2⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exeC:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exe --daemonized3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4012
-
-