Overview
overview
10Static
static
10xmrig-6.22...64.sys
windows7-x64
1xmrig-6.22...64.sys
windows10-2004-x64
1xmrig-6.22...0M.cmd
windows7-x64
10xmrig-6.22...0M.cmd
windows10-2004-x64
10xmrig-6.22...1M.cmd
windows7-x64
10xmrig-6.22...1M.cmd
windows10-2004-x64
10xmrig-6.22...le.cmd
windows7-x64
10xmrig-6.22...le.cmd
windows10-2004-x64
10xmrig-6.22...le.cmd
windows7-x64
10xmrig-6.22...le.cmd
windows10-2004-x64
10xmrig-6.22...le.cmd
windows7-x64
10xmrig-6.22...le.cmd
windows10-2004-x64
10xmrig-6.22...rt.cmd
windows7-x64
10xmrig-6.22...rt.cmd
windows10-2004-x64
10xmrig-6.22...ig.exe
windows7-x64
10xmrig-6.22...ig.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 00:17
Behavioral task
behavioral1
Sample
xmrig-6.22.2/WinRing0x64.sys
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
xmrig-6.22.2/WinRing0x64.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xmrig-6.22.2/benchmark_10M.cmd
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
xmrig-6.22.2/benchmark_10M.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
xmrig-6.22.2/benchmark_1M.cmd
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
xmrig-6.22.2/benchmark_1M.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
xmrig-6.22.2/pool_mine_example.cmd
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
xmrig-6.22.2/pool_mine_example.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
xmrig-6.22.2/rtm_ghostrider_example.cmd
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
xmrig-6.22.2/rtm_ghostrider_example.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
xmrig-6.22.2/solo_mine_example.cmd
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
xmrig-6.22.2/solo_mine_example.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
xmrig-6.22.2/start.cmd
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
xmrig-6.22.2/start.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
xmrig-6.22.2/xmrig.exe
Resource
win7-20241010-en
General
-
Target
xmrig-6.22.2/benchmark_1M.cmd
-
Size
60B
-
MD5
cba1927cf6959dc99ecbd0c553e4db6f
-
SHA1
7f2d59cfdf2b0550d22ac54d0b1fa5ac8f8b5f57
-
SHA256
d7747e7a3c782009f4ceb6e9c106115876386853929563b509da5258e3968d15
-
SHA512
c78ab9b017153c497ef2d0f568ade265ae9b60238ebdb36d8ef7ecc4d232cd90fd5fdc5b600bb26437466c7300e571b95b4ff92a7f024a981a02196a14d6e3f1
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 14 IoCs
resource yara_rule behavioral6/memory/3952-2-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-5-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-8-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-9-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-10-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-11-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-12-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-13-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-14-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-15-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-16-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-17-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-18-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig behavioral6/memory/3952-19-0x00007FF7E8B90000-0x00007FF7E97C4000-memory.dmp xmrig -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 3952 xmrig.exe Token: SeLockMemoryPrivilege 3952 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3952 xmrig.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3952 2424 cmd.exe 83 PID 2424 wrote to memory of 3952 2424 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.2\benchmark_1M.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.2\xmrig.exexmrig.exe --bench=1M --submit2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3952
-