Play interactive tourEdit tour

Windows Analysis Report xmrig.exe

Overview

General Information

Sample Name:xmrig.exe
Analysis ID:495011
MD5:0e2431a09f5aae6d9f436e62eb41ed69
SHA1:72952d136bbcb52b690dbc1abae72141068cc824
SHA256:f1bf0e4475a869d62580e17be7add63ba1407f8afc6c01dd203f7dfe05914950
Infos:

Most interesting Screenshot:

Detection

Xmrig
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Malicious sample detected (through community Yara rule)
Found strings related to Crypto-Mining
Potential time zone aware malware
Yara signature match
Sample file is different than original file name gathered from version info
PE file contains strange resources
PE file contains sections with non-standard names
Program does not show much activity (idle)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • xmrig.exe (PID: 1052 cmdline: 'C:\Users\user\Desktop\xmrig.exe' MD5: 0E2431A09F5AAE6D9F436E62EB41ED69)
    • conhost.exe (PID: 5400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found
SourceRuleDescriptionAuthorStrings
xmrig.exePUA_WIN_XMRIG_CryptoCoin_Miner_Dec20Detects XMRIG crypto coin minersFlorian Roth
  • 0x1e4988:$x1: xmrig.exe
  • 0x1e4878:$x2: xmrig.com
  • 0x1e494c:$x2: xmrig.com
xmrig.exeMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
  • 0x1a7631:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
xmrig.exeJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.648069559.00007FF69ED76000.00000002.00020000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      00000000.00000002.649585296.000001BB9ED16000.00000004.00000020.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        00000000.00000002.650401118.00007FF69ED76000.00000002.00020000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          00000000.00000002.649570365.000001BB9ED00000.00000004.00000020.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            00000000.00000002.650259516.00007FF69EA80000.00000002.00020000.sdmpCoinMiner_StringsDetects mining pool protocol string in ExecutableFlorian Roth
            • 0x1c938:$s1: stratum+tcp://
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            0.2.xmrig.exe.7ff69e900000.0.unpackPUA_WIN_XMRIG_CryptoCoin_Miner_Dec20Detects XMRIG crypto coin minersFlorian Roth
            • 0x1e4988:$x1: xmrig.exe
            • 0x1e4878:$x2: xmrig.com
            • 0x1e494c:$x2: xmrig.com
            0.2.xmrig.exe.7ff69e900000.0.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
            • 0x1a7631:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
            0.2.xmrig.exe.7ff69e900000.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              0.0.xmrig.exe.7ff69e900000.0.unpackPUA_WIN_XMRIG_CryptoCoin_Miner_Dec20Detects XMRIG crypto coin minersFlorian Roth
              • 0x1e4988:$x1: xmrig.exe
              • 0x1e4878:$x2: xmrig.com
              • 0x1e494c:$x2: xmrig.com
              0.0.xmrig.exe.7ff69e900000.0.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
              • 0x1a7631:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
              Click to see the 1 entries

              Sigma Overview

              No Sigma rule has matched

              Jbx Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Antivirus / Scanner detection for submitted sample
              Source: xmrig.exeAvira: detected
              Multi AV Scanner detection for submitted file
              Source: xmrig.exeVirustotal: Detection: 70%Perma Link
              Source: xmrig.exeMetadefender: Detection: 35%Perma Link
              Source: xmrig.exeReversingLabs: Detection: 74%

              Bitcoin Miner:

              barindex
              Yara detected Xmrig cryptocurrency miner
              Source: Yara matchFile source: xmrig.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.xmrig.exe.7ff69e900000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.xmrig.exe.7ff69e900000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.648069559.00007FF69ED76000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.649585296.000001BB9ED16000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.650401118.00007FF69ED76000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.649570365.000001BB9ED00000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.650259516.00007FF69EA80000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.647951192.00007FF69EA80000.00000002.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xmrig.exe PID: 1052, type: MEMORYSTR
              Found strings related to Crypto-Mining
              Source: xmrig.exe, 00000000.00000000.647951192.00007FF69EA80000.00000002.00020000.sdmpString found in binary or memory: stratum+tcp://
              Source: xmrig.exe, 00000000.00000000.647951192.00007FF69EA80000.00000002.00020000.sdmpString found in binary or memory: cryptonight/0
              Source: xmrig.exe, 00000000.00000000.647951192.00007FF69EA80000.00000002.00020000.sdmpString found in binary or memory: stratum+tcp://
              Source: xmrig.exe, 00000000.00000000.647951192.00007FF69EA80000.00000002.00020000.sdmpString found in binary or memory: -o, --url=URL URL of mining server
              Source: xmrig.exe, 00000000.00000000.647951192.00007FF69EA80000.00000002.00020000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
              Source: xmrig.exeString found in binary or memory: XMRig miner
              Source: xmrig.exeStatic PE information: certificate valid
              Source: xmrig.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
              Source: xmrig.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSAExtendedValidationCodeSigningCA.crl0
              Source: xmrig.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSAExtendedValidationCodeSigningCA.crt0#
              Source: xmrig.exeString found in binary or memory: http://ocsp.sectigo.com0&
              Source: xmrig.exeString found in binary or memory: https://sectigo.com/CPS0U
              Source: xmrig.exeString found in binary or memory: https://xmrig.com/benchmark/%s
              Source: xmrig.exeString found in binary or memory: https://xmrig.com/docs/algorithms
              Source: xmrig.exe, ConDrv.0.drString found in binary or memory: https://xmrig.com/wizard
              Source: xmrig.exeString found in binary or memory: https://xmrig.com/wizard%s

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)
              Source: xmrig.exe, type: SAMPLEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
              Source: 0.2.xmrig.exe.7ff69e900000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
              Source: 0.0.xmrig.exe.7ff69e900000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
              Source: xmrig.exe, type: SAMPLEMatched rule: PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20 date = 2020-12-31, hash1 = b6154d25b3aa3098f2cee790f5de5a727fc3549865a7aa2196579fe39a86de09, author = Florian Roth, description = Detects XMRIG crypto coin miners, reference = https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/
              Source: xmrig.exe, type: SAMPLEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc
              Source: 0.2.xmrig.exe.7ff69e900000.0.unpack, type: UNPACKEDPEMatched rule: PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20 date = 2020-12-31, hash1 = b6154d25b3aa3098f2cee790f5de5a727fc3549865a7aa2196579fe39a86de09, author = Florian Roth, description = Detects XMRIG crypto coin miners, reference = https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/
              Source: 0.2.xmrig.exe.7ff69e900000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc
              Source: 0.0.xmrig.exe.7ff69e900000.0.unpack, type: UNPACKEDPEMatched rule: PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20 date = 2020-12-31, hash1 = b6154d25b3aa3098f2cee790f5de5a727fc3549865a7aa2196579fe39a86de09, author = Florian Roth, description = Detects XMRIG crypto coin miners, reference = https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/
              Source: 0.0.xmrig.exe.7ff69e900000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc
              Source: 00000000.00000002.650259516.00007FF69EA80000.00000002.00020000.sdmp, type: MEMORYMatched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://minergate.com/faq/what-pool-address
              Source: 00000000.00000000.647951192.00007FF69EA80000.00000002.00020000.sdmp, type: MEMORYMatched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://minergate.com/faq/what-pool-address
              Source: Process Memory Space: xmrig.exe PID: 1052, type: MEMORYSTRMatched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://minergate.com/faq/what-pool-address
              Source: xmrig.exeBinary or memory string: OriginalFilename vs xmrig.exe
              Source: xmrig.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: xmrig.exeVirustotal: Detection: 70%
              Source: xmrig.exeMetadefender: Detection: 35%
              Source: xmrig.exeReversingLabs: Detection: 74%
              Source: C:\Users\user\Desktop\xmrig.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\xmrig.exe 'C:\Users\user\Desktop\xmrig.exe'
              Source: C:\Users\user\Desktop\xmrig.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5400:120:WilError_01
              Source: xmrig.exeString found in binary or memory: -h, --help display this help and exit
              Source: xmrig.exeString found in binary or memory: -h, --help display this help and exit
              Source: xmrig.exeString found in binary or memory: --help
              Source: xmrig.exeString found in binary or memory: --help
              Source: xmrig.exeString found in binary or memory: --help--version--export-topology%s
              Source: xmrig.exeString found in binary or memory: --help--version--export-topology%s
              Source: classification engineClassification label: mal80.evad.mine.winEXE@2/1@0/0
              Source: xmrig.exeStatic file information: File size 1998512 > 1048576
              Source: xmrig.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: xmrig.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: xmrig.exeStatic PE information: certificate valid
              Source: xmrig.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x17ea00
              Source: xmrig.exeStatic PE information: More than 200 imports for KERNEL32.dll
              Source: xmrig.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: xmrig.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: xmrig.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: xmrig.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: xmrig.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: xmrig.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: xmrig.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
              Source: xmrig.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: xmrig.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: xmrig.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: xmrig.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: xmrig.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: xmrig.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: xmrig.exeStatic PE information: section name: _RANDOMX
              Source: xmrig.exeStatic PE information: section name: _TEXT_CN
              Source: xmrig.exeStatic PE information: section name: _TEXT_CN
              Source: xmrig.exeStatic PE information: section name: _RDATA

              Malware Analysis System Evasion:

              barindex
              Potential time zone aware malware
              Source: C:\Users\user\Desktop\xmrig.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\xmrig.exeCode function: 0_2_00007FF69EA2E318 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF69EA2E318

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsCommand and Scripting Interpreter2Path InterceptionProcess Injection1Process Injection1OS Credential DumpingSystem Time Discovery11Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 495011 Sample: xmrig.exe Startdate: 01/10/2021 Architecture: WINDOWS Score: 80 11 Malicious sample detected (through community Yara rule) 2->11 13 Antivirus / Scanner detection for submitted sample 2->13 15 Multi AV Scanner detection for submitted file 2->15 17 2 other signatures 2->17 6 xmrig.exe 1 2->6         started        process3 signatures4 19 Potential time zone aware malware 6->19 9 conhost.exe 6->9         started        process5

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand
              SourceDetectionScannerLabelLink
              xmrig.exe71%VirustotalBrowse
              xmrig.exe35%MetadefenderBrowse
              xmrig.exe74%ReversingLabsWin64.Trojan.Miner
              xmrig.exe100%AviraHEUR/AGEN.1134782
              No Antivirus matches
              SourceDetectionScannerLabelLinkDownload
              0.0.xmrig.exe.7ff69e900000.0.unpack100%AviraHEUR/AGEN.1134782Download File
              0.2.xmrig.exe.7ff69e900000.0.unpack100%AviraHEUR/AGEN.1134782Download File
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://crl.sectigo.com/SectigoRSAExtendedValidationCodeSigningCA.crl01%VirustotalBrowse
              http://crl.sectigo.com/SectigoRSAExtendedValidationCodeSigningCA.crl00%Avira URL Cloudsafe
              https://xmrig.com/benchmark/%s0%URL Reputationsafe
              https://xmrig.com/wizard0%URL Reputationsafe
              http://ocsp.sectigo.com0&0%Avira URL Cloudsafe
              https://sectigo.com/CPS0U0%URL Reputationsafe
              https://xmrig.com/wizard%s0%URL Reputationsafe
              http://crt.sectigo.com/SectigoRSAExtendedValidationCodeSigningCA.crt0#3%VirustotalBrowse
              http://crt.sectigo.com/SectigoRSAExtendedValidationCodeSigningCA.crt0#0%Avira URL Cloudsafe
              https://xmrig.com/docs/algorithms0%URL Reputationsafe

              Download Network PCAP: filteredfull

              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://crl.sectigo.com/SectigoRSAExtendedValidationCodeSigningCA.crl0xmrig.exefalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://xmrig.com/benchmark/%sxmrig.exefalse
              • URL Reputation: safe
              unknown
              https://xmrig.com/wizardxmrig.exe, ConDrv.0.drfalse
              • URL Reputation: safe
              unknown
              http://ocsp.sectigo.com0&xmrig.exefalse
              • Avira URL Cloud: safe
              low
              https://sectigo.com/CPS0Uxmrig.exefalse
              • URL Reputation: safe
              unknown
              https://xmrig.com/wizard%sxmrig.exefalse
              • URL Reputation: safe
              unknown
              http://crt.sectigo.com/SectigoRSAExtendedValidationCodeSigningCA.crt0#xmrig.exefalse
              • 3%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://xmrig.com/docs/algorithmsxmrig.exefalse
              • URL Reputation: safe
              unknown
              No contacted IP infos

              General Information

              Joe Sandbox Version:33.0.0 White Diamond
              Analysis ID:495011
              Start date:01.10.2021
              Start time:10:23:14
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 2m 31s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:xmrig.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal80.evad.mine.winEXE@2/1@0/0
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 100% (good quality ratio 50%)
              • Quality average: 50%
              • Quality standard deviation: 50%
              HCA Information:Failed
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              • Stop behavior analysis, all processes terminated
              Warnings:
              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.82.209.183, 23.54.113.53
              • Excluded domains from analysis (whitelisted): e12564.dspb.akamaiedge.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com, arc.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com
              • Execution Graph export aborted for target xmrig.exe, PID 1052 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              No simulations
              No context
              No context
              No context
              No context
              No context
              \Device\ConDrv
              Process:C:\Users\user\Desktop\xmrig.exe
              File Type:ASCII text, with CRLF, CR line terminators
              Category:dropped
              Size (bytes):321
              Entropy (8bit):5.1227010002372255
              Encrypted:false
              SSDEEP:6:o9U9dQfzCwvG25zZvv9dQUCwM5zZvv9dQ9CwZIFzZvv9dQNKpg6QIR/BJrXMnGTJ:oGmzttbt2utZIfWKpxRJJTMGgy
              MD5:DF60062C25B76E74BF2456B10128622A
              SHA1:A418E201FCA1327329B4625E2C78FE07C96394D9
              SHA-256:9CAAA74F7E42863A28330BAA11A772DD17A517F48824BAD5032952D63B55788B
              SHA-512:3061EF2A32000B378D174C1D8F10614D7784C917E7DB3013B3D2216078CF07D6B2BB46961F95D0E10439056B927070C5B4EF5446370155DCC559F14BAA4B1C27
              Malicious:false
              Reputation:low
              Preview: [2021-10-01 11:30:34.871] unable to open "C:\Users\user\Desktop\config.json"....[2021-10-01 11:30:34.874] unable to open "C:\Users\user\.xmrig.json"....[2021-10-01 11:30:34.877] unable to open "C:\Users\user\.config\xmrig.json"....[2021-10-01 11:30:34.877] no valid configuration found, try https://xmrig.com/wizard...

              Static File Info

              General

              File type:PE32+ executable (console) x86-64, for MS Windows
              Entropy (8bit):6.56842313823887
              TrID:
              • Win64 Executable Console (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:xmrig.exe
              File size:1998512
              MD5:0e2431a09f5aae6d9f436e62eb41ed69
              SHA1:72952d136bbcb52b690dbc1abae72141068cc824
              SHA256:f1bf0e4475a869d62580e17be7add63ba1407f8afc6c01dd203f7dfe05914950
              SHA512:3f05782c7b6d8548a9265c662fc058089f2b912ac0847b5d03cd64ea99c03ee62631768533a6df09be41028abef53641044b6e2efe60cea6252c02dadc6da179
              SSDEEP:49152:LdM2G2PRCj8LkSHe9zJ3dJYxkLgmeYknvCMndZmdI0uS:hDGJYGLgme7vHdZqdR
              File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$..........L[.y.[.y.[.y.4.}.A.y.4.z.V.y.4.|...y..:.._.y...}.I.y...z.Q.y...|...y...}.I.y.4.x.T.y.[.x.j.y...}.E.y...p...y...z.X.y.....Z.y

              File Icon

              Icon Hash:e8b6b4c958d6c6e8

              General

              Entrypoint:0x14012ddc8
              Entrypoint Section:.text
              Digitally signed:true
              Imagebase:0x140000000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
              Time Stamp:0x600E9FB6 [Mon Jan 25 10:38:46 2021 UTC]
              TLS Callbacks:0x4012daf0, 0x1
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:c63ee349950c5add3bd78c668f7c463b
              Signature Valid:true
              Signature Issuer:CN=Sectigo RSA Extended Validation Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
              Signature Validation Error:The operation completed successfully
              Error Number:0
              Not Before, Not After
              • 5/23/2019 2:00:00 AM 5/30/2021 1:59:59 AM
              Subject Chain
              • CN=Cudo Ventures Ltd, O=Cudo Ventures Ltd, STREET=18 Christchurch Road, L=Bournemouth, S=Dorset, PostalCode=BH1 3NE, C=GB, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, SERIALNUMBER=11065412
              Version:3
              Thumbprint MD5:A7B1698B3E29525EF24E8960F121AA57
              Thumbprint SHA-1:0849317604DA03D9F1BE012A579CB07DB4C27442
              Thumbprint SHA-256:F9A1BD3498A3B26A99ABD7D46D8DC4BAFF7FE5551A987C4EAAC0C5233CAD326C
              Serial:00964262E2E46AFA6D1315F835DB9DB964
              Instruction
              dec eax
              sub esp, 28h
              call 00007F4484B0295Ch
              dec eax
              add esp, 28h
              jmp 00007F4484B02287h
              int3
              int3
              dec eax
              sub esp, 28h
              dec ebp
              mov eax, dword ptr [ecx+38h]
              dec eax
              mov ecx, edx
              dec ecx
              mov edx, ecx
              call 00007F4484B02422h
              mov eax, 00000001h
              dec eax
              add esp, 28h
              ret
              int3
              int3
              int3
              inc eax
              push ebx
              inc ebp
              mov ebx, dword ptr [eax]
              dec eax
              mov ebx, edx
              inc ecx
              and ebx, FFFFFFF8h
              dec esp
              mov ecx, ecx
              inc ecx
              test byte ptr [eax], 00000004h
              dec esp
              mov edx, ecx
              je 00007F4484B02425h
              inc ecx
              mov eax, dword ptr [eax+08h]
              dec ebp
              arpl word ptr [eax+04h], dx
              neg eax
              dec esp
              add edx, ecx
              dec eax
              arpl ax, cx
              dec esp
              and edx, ecx
              dec ecx
              arpl bx, ax
              dec edx
              mov edx, dword ptr [eax+edx]
              dec eax
              mov eax, dword ptr [ebx+10h]
              mov ecx, dword ptr [eax+08h]
              dec eax
              mov eax, dword ptr [ebx+08h]
              test byte ptr [ecx+eax+03h], 0000000Fh
              je 00007F4484B0241Dh
              movzx eax, byte ptr [ecx+eax+03h]
              and eax, FFFFFFF0h
              dec esp
              add ecx, eax
              dec esp
              xor ecx, edx
              dec ecx
              mov ecx, ecx
              pop ebx
              jmp 00007F4484B0174Eh
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              nop word ptr [eax+eax+00000000h]
              dec eax
              sub esp, 10h
              dec esp
              mov dword ptr [esp], edx
              dec esp
              mov dword ptr [esp+08h], ebx
              dec ebp
              xor ebx, ebx
              dec esp
              lea edx, dword ptr [esp+18h]
              dec esp
              sub edx, eax
              dec ebp
              cmovb edx, ebx
              dec esp
              mov ebx, dword ptr [eax+eax]
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1c6b640xa0.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x4770000x59c0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4620000xe328.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x1e70000xeb0.data
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x47d0000x23f0.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x1aa2000x1c.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x1aa3800x28.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1aa2200x138.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x1800000x890.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x17e91f0x17ea00False0.456258550106data6.5372513139IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rdata0x1800000x488500x48a00False0.423024688038data5.58244774848IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x1c90000x298b940x5c00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .pdata0x4620000xe3280xe400False0.490011650219data6.10300182473IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              _RANDOMX0x4710000xbd60xc00False0.527018229167data6.21135202089IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              _TEXT_CN0x4720000x18ce0x1a00False0.328575721154data6.00096849672IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              _TEXT_CN0x4740000x11840x1200False0.533203125data6.04792421687IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              _RDATA0x4760000x940x200False0.208984375data1.43741768711IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rsrc0x4770000x59c00x5a00False0.381684027778data5.42818311759IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x47d0000x23f00x2400False0.300564236111data5.44660216404IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0x4771c00x18fbPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
              RT_ICON0x478ac00x25a8dataEnglishUnited States
              RT_ICON0x47b0680x10a8dataEnglishUnited States
              RT_ICON0x47c1100x468GLS_BINARY_LSB_FIRSTEnglishUnited States
              RT_GROUP_ICON0x47c5780x3edataEnglishUnited States
              RT_VERSION0x47c5b80x284dataEnglishUnited States
              RT_MANIFEST0x47c8400x17dXML 1.0 document textEnglishUnited States
              DLLImport
              WS2_32.dllntohs, WSASetLastError, WSAStartup, select, WSARecvFrom, WSASocketW, WSASend, WSARecv, WSAIoctl, WSADuplicateSocketW, socket, shutdown, setsockopt, listen, getsockopt, getsockname, getpeername, ioctlsocket, closesocket, bind, FreeAddrInfoW, GetAddrInfoW, WSAGetLastError, gethostname, htonl, htons
              PSAPI.DLLGetProcessMemoryInfo
              IPHLPAPI.DLLGetAdaptersAddresses
              USERENV.dllGetUserProfileDirectoryW
              KERNEL32.dllRaiseException, SetStdHandle, GetCommandLineA, RtlPcToFileHeader, RtlUnwindEx, WriteConsoleW, SetConsoleTitleA, GetStdHandle, SetConsoleMode, GetConsoleMode, SizeofResource, LockResource, LoadResource, FindResourceW, MultiByteToWideChar, SetPriorityClass, GetCurrentProcess, SetThreadPriority, GetSystemPowerStatus, GetCurrentThread, GetProcAddress, GetModuleHandleW, CloseHandle, FreeConsole, GetConsoleWindow, VirtualProtect, VirtualFree, VirtualAlloc, GetLargePageMinimum, LocalAlloc, GetLastError, LocalFree, FlushInstructionCache, DeviceIoControl, GetModuleFileNameW, CreateFileW, GetCurrentThreadId, AddVectoredExceptionHandler, GetFileType, PostQueuedCompletionStatus, CreateFileA, DuplicateHandle, SetEvent, ResetEvent, WaitForSingleObject, CreateEventA, Sleep, QueueUserWorkItem, RegisterWaitForSingleObject, UnregisterWait, WideCharToMultiByte, GetNumberOfConsoleInputEvents, ReadConsoleInputW, ReadConsoleW, FillConsoleOutputCharacterW, FillConsoleOutputAttribute, GetConsoleCursorInfo, SetConsoleCursorInfo, GetConsoleScreenBufferInfo, SetConsoleCursorPosition, SetConsoleTextAttribute, WriteConsoleInputW, VerSetConditionMask, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentVariableW, SetEnvironmentVariableW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetTempPathW, SetLastError, QueryPerformanceCounter, QueryPerformanceFrequency, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetCurrentProcessId, GlobalMemoryStatusEx, GetSystemInfo, GetSystemTimeAsFileTime, GetVersionExW, VerifyVersionInfoA, FileTimeToSystemTime, GetCommandLineW, CreateDirectoryW, FindClose, FindFirstFileW, FindNextFileW, FlushFileBuffers, GetDiskFreeSpaceW, GetFileAttributesW, GetFileInformationByHandle, GetFileSizeEx, GetFinalPathNameByHandleW, GetFullPathNameW, ReadFile, RemoveDirectoryW, SetFilePointerEx, SetFileTime, WriteFile, MapViewOfFile, FlushViewOfFile, UnmapViewOfFile, CreateFileMappingA, ReOpenFile, CopyFileW, MoveFileExW, CreateHardLinkW, GetFileInformationByHandleEx, CreateSymbolicLinkW, SetConsoleCtrlHandler, GetLongPathNameW, GetShortPathNameW, CreateIoCompletionPort, ReadDirectoryChangesW, SetHandleInformation, RtlUnwind, SetFileCompletionNotificationModes, SetErrorMode, GetQueuedCompletionStatus, ConnectNamedPipe, PeekNamedPipe, CreateNamedPipeW, CancelIoEx, CancelSynchronousIo, DeleteCriticalSection, SwitchToThread, TerminateProcess, GetExitCodeProcess, UnregisterWaitEx, LCMapStringW, DebugBreak, FormatMessageA, TryEnterCriticalSection, InitializeConditionVariable, WakeConditionVariable, SleepConditionVariableCS, ReleaseSemaphore, ResumeThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetNativeSystemInfo, CreateSemaphoreA, GetModuleHandleA, LoadLibraryA, GetStartupInfoW, GetModuleFileNameA, GetVersionExA, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, GetComputerNameA, LoadLibraryW, QueryDepthSList, InterlockedFlushSList, InterlockedPushEntrySList, InterlockedPopEntrySList, LoadLibraryExW, FreeLibraryAndExitThread, ExitThread, GetModuleHandleExW, GetFileAttributesExW, SetFileAttributesW, GetConsoleCP, GetDriveTypeW, SystemTimeToTzSpecificLocalTime, ExitProcess, HeapAlloc, HeapFree, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, HeapReAlloc, GetTimeZoneInformation, HeapSize, SetEndOfFile, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetProcessHeap, CancelIo, WaitForSingleObjectEx, GetExitCodeThread, EncodePointer, DecodePointer, GetCPInfo, InitializeCriticalSectionAndSpinCount, CreateEventW, GetTickCount, CompareStringW, GetLocaleInfoW, GetStringTypeW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, IsDebuggerPresent, InitializeSListHead, CreateTimerQueue, SignalObjectAndWait, CreateThread, GetThreadPriority, GetLogicalProcessorInformation, CreateTimerQueueTimer, ChangeTimerQueueTimer, DeleteTimerQueueTimer, GetNumaHighestNodeNumber, GetThreadTimes, FreeLibrary
              USER32.dllMapVirtualKeyW, GetMessageA, ShowWindow, GetSystemMetrics, TranslateMessage, DispatchMessageA
              ADVAPI32.dllSystemFunction036, GetUserNameW, CreateServiceW, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, QueryServiceConfigA, DeleteService, ControlService, StartServiceW, OpenServiceW, LookupPrivilegeValueW, AdjustTokenPrivileges, OpenProcessToken, LsaOpenPolicy, LsaAddAccountRights, LsaClose, GetTokenInformation
              DescriptionData
              LegalCopyrightCopyright (C) 2016-2021 xmrig.com
              FileVersion6.7.2
              CompanyNamewww.xmrig.com
              ProductNameXMRig
              ProductVersion6.7.2
              FileDescriptionXMRig miner
              OriginalFilenamexmrig.exe
              Translation0x0000 0x04b0
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States

              Network Behavior

              Download Network PCAP: filteredfull

              TimestampSource PortDest PortSource IPDest IP
              Oct 1, 2021 10:23:57.457556963 CEST5453153192.168.2.48.8.8.8
              Oct 1, 2021 10:23:57.485270977 CEST53545318.8.8.8192.168.2.4
              Oct 1, 2021 10:23:59.915610075 CEST4971453192.168.2.48.8.8.8
              Oct 1, 2021 10:23:59.934783936 CEST53497148.8.8.8192.168.2.4

              Code Manipulations

              Statistics

              CPU Usage

              01020s020406080100

              Click to jump to process

              Memory Usage

              Click to jump to process

              Behavior

              Click to jump to process

              System Behavior

              Start time:10:24:03
              Start date:01/10/2021
              Path:C:\Users\user\Desktop\xmrig.exe
              Wow64 process (32bit):false
              Commandline:'C:\Users\user\Desktop\xmrig.exe'
              Imagebase:0x7ff69e900000
              File size:1998512 bytes
              MD5 hash:0E2431A09F5AAE6D9F436E62EB41ED69
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000000.648069559.00007FF69ED76000.00000002.00020000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000002.649585296.000001BB9ED16000.00000004.00000020.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000002.650401118.00007FF69ED76000.00000002.00020000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000002.649570365.000001BB9ED00000.00000004.00000020.sdmp, Author: Joe Security
              • Rule: CoinMiner_Strings, Description: Detects mining pool protocol string in Executable, Source: 00000000.00000002.650259516.00007FF69EA80000.00000002.00020000.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000002.650259516.00007FF69EA80000.00000002.00020000.sdmp, Author: Joe Security
              • Rule: CoinMiner_Strings, Description: Detects mining pool protocol string in Executable, Source: 00000000.00000000.647951192.00007FF69EA80000.00000002.00020000.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000000.647951192.00007FF69EA80000.00000002.00020000.sdmp, Author: Joe Security
              Reputation:low
              Start time:10:24:04
              Start date:01/10/2021
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff724c50000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Disassembly

              Code Analysis