Analysis

  • max time kernel
    140s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2024, 00:17

General

  • Target

    xmrig-6.22.2/start.cmd

  • Size

    44B

  • MD5

    eaf3a00cc0465f8af471b849ada29843

  • SHA1

    3042e97874706189aa9704d77c9e74a94e519106

  • SHA256

    8e70ef38fe14a2ee2848df3d6f7e260d1caf8cfc15de694d678b8af151d62333

  • SHA512

    56b9f3991ae4bad5e06097d095931e746e6b2ac955649a5c793d9f4f6861c6ffc9316b063c34d7a8079af201354c87bf3008bc0fd4321e59b27e1d8120b078cf

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.2\start.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4176
    • C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.2\xmrig.exe
      xmrig.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3004

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3004-0-0x000001D3C6D80000-0x000001D3C6DA0000-memory.dmp

    Filesize

    128KB

  • memory/3004-2-0x000001D3C6DD0000-0x000001D3C6DF0000-memory.dmp

    Filesize

    128KB

  • memory/3004-3-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-4-0x000001D3C7080000-0x000001D3C70A0000-memory.dmp

    Filesize

    128KB

  • memory/3004-5-0x000001D3C70A0000-0x000001D3C70C0000-memory.dmp

    Filesize

    128KB

  • memory/3004-6-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-7-0x000001D3C7080000-0x000001D3C70A0000-memory.dmp

    Filesize

    128KB

  • memory/3004-8-0x000001D3C70A0000-0x000001D3C70C0000-memory.dmp

    Filesize

    128KB

  • memory/3004-9-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-10-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-11-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-12-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-13-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-14-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-15-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-16-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-17-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-18-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-19-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB

  • memory/3004-20-0x00007FF646F50000-0x00007FF647B84000-memory.dmp

    Filesize

    12.2MB