Report - cHXswWx.exe

XMRig Miner Generic Malware Malicious Packer Malicious Library UPX PE File .NET EXE PE32 OS Processor Check GIF Format Lnk Format PE64
ScreenShot
Created 2025.05.06 21:40 Machine s1_win7_x6403
Filename cHXswWx.exe
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
AI Score
2
Behavior Score
6.8
ZERO API file : clean
VT API (file) 40 detected (AIDetectMalware, Ghanarava, Miner, Unsafe, malicious, confidence, 100%, Attribute, HighConfidence, Cryptominer, Xmrig, CoinMiner, BypassUAC, HackTool, XMRMiner, CLASSIC, Tool, BtcMine, XMRig Miner, Static AI, Malicious PE, Detected, Artemis, BitcoinMiner, susgen)
md5 530058a2734e0c83cf81f50a43bdb243
sha256 dde8a15bf633b6ffd33dd485ae6c97fc3aecc87978fcdb9dbc0bcfa2aa3b5491
ssdeep 98304:NtRK2Xvf49fuI0nBkLuFvJr4XGCkc/zF2fz5IZ4ePzpS+KdbjrD/6K+TU3nA:k2Xv42VKzYz6Z4qSndf3D+TU3A
imphash f34d5f2d4577ed6d9ceec516c1f5a744
impfuzzy 3:rGsLdAIEK:tf
  Network IP location

Signature (16cnts)

Level Description
danger File has been identified by 40 AntiVirus engines on VirusTotal as malicious
watch A stratum cryptocurrency mining command was executed
watch Created a service where a service was also not started
watch Detects Virtual Machines through their custom firmware
watch Installs itself for autorun at Windows startup
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Creates a shortcut to an executable file
notice Creates executable files on the filesystem
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (19cnts)

Level Name Description Collection
danger XMRig_Miner_IN XMRig Miner binaries (download)
danger XMRig_Miner_IN XMRig Miner binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info Is_DotNET_EXE (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info lnk_file_format Microsoft Windows Shortcut File Format binaries (download)
info Lnk_Format_Zero LNK Format binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
pool.hashvault.pro Unknown 157.20.104.252 mailcious
157.20.104.252 Unknown 157.20.104.252 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

mscoree.dll
 0x402000 _CorExeMain

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure