Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2024, 00:17

General

  • Target

    xmrig-6.22.2/solo_mine_example.cmd

  • Size

    821B

  • MD5

    090703e56f46330ed625ac4363c9d25c

  • SHA1

    6ce0b265e0860f1913f4bb37a17aa7eda88641c5

  • SHA256

    33497c69c21fa96bbc96f1d7f09608e462f8ab22555364977c0bd35fef27bc29

  • SHA512

    1cd8c43287508c9393300d5a22c565d2f4bd98493a203112fd727518a4e439eb74035d18fe1f52e2d3594305a841ca93fcd0e3c61634f0992cfd3fc253872f19

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.2\solo_mine_example.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.2\xmrig.exe
      xmrig.exe -o YOUR_NODE_IP:18081 -a rx/0 -u 48edfHu7V9Z84YzzMa6fUueoELZ9ZRXq9VetWzYGzKt52XU5xvqgzYnDK9URnRoJMk1j8nLwEVsaSWJ4fhdUyZijBGUicoD --daemon
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1036

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1036-0-0x000002DFE69E0000-0x000002DFE6A00000-memory.dmp

    Filesize

    128KB

  • memory/1036-1-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-2-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-3-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-4-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-5-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-6-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-7-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-8-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-9-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-10-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-11-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-12-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-13-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB

  • memory/1036-14-0x00007FF7C5A30000-0x00007FF7C6664000-memory.dmp

    Filesize

    12.2MB