Overview
overview
10Static
static
10cz-x1/WinRing0x64.sys
windows7-x64
1cz-x1/WinRing0x64.sys
windows10-2004-x64
1cz-x1/benc...0M.cmd
windows7-x64
1cz-x1/benc...0M.cmd
windows10-2004-x64
1cz-x1/benc...1M.cmd
windows7-x64
1cz-x1/benc...1M.cmd
windows10-2004-x64
1cz-x1/pool...le.cmd
windows7-x64
1cz-x1/pool...le.cmd
windows10-2004-x64
1cz-x1/rtm_...le.cmd
windows7-x64
1cz-x1/rtm_...le.cmd
windows10-2004-x64
1cz-x1/solo...le.cmd
windows7-x64
1cz-x1/solo...le.cmd
windows10-2004-x64
1cz-x1/start.cmd
windows7-x64
1cz-x1/start.cmd
windows10-2004-x64
1cz-x1/xmrig.exe
windows7-x64
1cz-x1/xmrig.exe
windows10-2004-x64
1Analysis
-
max time kernel
12s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 03:32
Behavioral task
behavioral1
Sample
cz-x1/WinRing0x64.sys
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cz-x1/WinRing0x64.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
cz-x1/benchmark_10M.cmd
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
cz-x1/benchmark_10M.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
cz-x1/benchmark_1M.cmd
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
cz-x1/benchmark_1M.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
cz-x1/pool_mine_example.cmd
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
cz-x1/pool_mine_example.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
cz-x1/rtm_ghostrider_example.cmd
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
cz-x1/rtm_ghostrider_example.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
cz-x1/solo_mine_example.cmd
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
cz-x1/solo_mine_example.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
cz-x1/start.cmd
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
cz-x1/start.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
cz-x1/xmrig.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
cz-x1/xmrig.exe
Resource
win10v2004-20240709-en
General
-
Target
cz-x1/solo_mine_example.cmd
-
Size
821B
-
MD5
090703e56f46330ed625ac4363c9d25c
-
SHA1
6ce0b265e0860f1913f4bb37a17aa7eda88641c5
-
SHA256
33497c69c21fa96bbc96f1d7f09608e462f8ab22555364977c0bd35fef27bc29
-
SHA512
1cd8c43287508c9393300d5a22c565d2f4bd98493a203112fd727518a4e439eb74035d18fe1f52e2d3594305a841ca93fcd0e3c61634f0992cfd3fc253872f19
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2140 xmrig.exe Token: SeLockMemoryPrivilege 2140 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 xmrig.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2140 1668 cmd.exe 31 PID 1668 wrote to memory of 2140 1668 cmd.exe 31 PID 1668 wrote to memory of 2140 1668 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cz-x1\solo_mine_example.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\cz-x1\xmrig.exexmrig.exe -o YOUR_NODE_IP:18081 -a rx/0 -u 48edfHu7V9Z84YzzMa6fUueoELZ9ZRXq9VetWzYGzKt52XU5xvqgzYnDK9URnRoJMk1j8nLwEVsaSWJ4fhdUyZijBGUicoD --daemon2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2140
-