Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Cryptomining

 

Use the JSA Cryptomining Content Extension to closely monitor for cryptomining in your deployment. Baseline Maintenance V1.05 or higher is required for Cryptomining to perform correctly. Install Baseline Maintenance before you install Cryptomining.

JSA Cryptomining Content Extension V1.0.0

The following table shows the custom properties that are included in JSA Cryptomining Content Extension V1.0.0.

Note

The custom properties that are included in this content extension are placeholders. You can download other content extensions that include custom properties with these names, or you can create your own.

Table 1: Custom Properties in JSA Cryptomining Content Extension V1.0.0

Custom Property

Found in

File Hash

Filename

ImageName

Sysmon

Process CommandLine

Process Name

Threat Name

URL

URLHost

The following table shows the rules and building blocks in JSA Cryptomining Content Extension V1.0.0.

Table 2: Rules and Building Blocks in JSA Cryptomining Content Extension V1.0.0

Type

Name

Description

Building Block

BB:DeviceDefinition: Operating System

This rule defines all operating systems on the system.

Building Block

BB:Threats: Communication to Cryptocurrency Mining IP

Detects communications to cryptocurrency mining IP addresses. Update the reference set for tuning.

Building Block

BB:Threats: Communication to Cryptocurrency Mining URL for Events

Detects communications to cryptocurrency mining hosts. Update the reference set for tuning.

Building Block

BB:Threats: Communication to Cryptocurrency Mining URL for Flows

Detects communications to cryptocurrency mining hosts. Update the reference set for tuning.

Building Block

BB:Threats: Cryptocurrency Mining Process Name Patterns

Detects when a well-known cryptocurrency mining process starts.

Building Block

BB:Threats: Cryptocurrency Mining Process Names

Detects when a well-known cryptocurrency mining process starts.

Building Block

BB:Threats: Cryptocurrency Mining Threat Hashes for Events

Detects threats to cryptocurrency mining with an SHA256 Hash. Update the reference set for tuning.

Building Block

BB:Threats: Cryptocurrency Mining Threat Hashes for Flows

Detects communications to cryptocurrency mining hosts. Update the reference set for tuning.

Building Block

BB:Threats: Cryptocurrency Mining Threat Name Patterns

Detects threats to cryptocurrency mining with frequently used terms, such as coin, crypto, and mine. Update the regular expression for tuning.

Building Block

BB:Threats: Cryptocurrency Mining Threat Names

Detects threats to cryptocurrency mining. Update the reference set for tuning.

Building Block

BB:Threats: X-Force Premium: Internal Connection to Host Categorized as Cryptocurrency Mining

This rule notifies when an internal system communicates with an IP address that is considered to be hosting cryptocurrency mining. It might be an indicator of a cryptocurrency mining malware infection. The default confidence (75) indicates a strong possibility that this is a cryptocurrency mining host.

Building Block

BB:Threats: X-Force Premium: Internal Host Communication with Cryptocurrency Mining URL for Events

This rule notifies when an internal client loads a web URL known for cryptocurrency mining activity.

Building Block

BB:Threats: X-Force Premium: Internal Host Communication with Cryptocurrency Mining URL for Flows

This rule notifies when an internal system communicates with an HTTP host that is considered to be hosting cryptocurrency mining. It might be an indicator of a cryptocurrency mining malware infection.

Rule

Detected a Communication to Cryptocurrency Mining Host

Detects communications to a cryptocurrency mining destination. This might indicate a compromised host by cryptocurrency mining malware.

Rule

Detected a Cryptocurrency Mining Activity Based on File Hash

Detects cryptocurrency mining file hashes.

Rule

Detected a Cryptocurrency Mining Activity Based on Process Command Line

Detects when a cryptocurrency mining activity based on process command line.

Rule

Detected a Cryptocurrency Mining Activity Based on Threat Name

Detects cryptocurrency mining threats.

Rule

Detected a Cryptocurrency Mining Process

Detects when a well-known cryptocurrency mining process starts.

Rule

Detected In-Browser Cryptojacking based on Loaded Javascript File Hash

Detects when the browser sends a GET request to load a cryptojacking javascript file. The rule uses the file hash to detect that activity.

Rule

Detected In-Browser Cryptojacking based on Loaded Javascript File Name

Detects when the browser sends a GET request to load a cryptojacking javascript file. The rule uses the URL file name component to detect that activity.

Rule

Exploit Attempt Followed By Cryptocurrency Mining Activity

Reports an exploit or attack type activity from the same source IP address followed by cryptocurrency mining activity from the same destination IP address as the original event within 15 minutes.

The following table shows the reports in JSA Cryptomining Content Extension V1.0.0.

Table 3: Reports in JSA Cryptomining Content Extension V1.0.0

Report Name

Search Name and Dependencies

IPs with Cryptocurrency Mining Activities

This report provides an overview of IP addresses related to cryptocurrency mining.

Update the search filter for more tuning.

The following table shows the reference data in JSA Cryptomining Content Extension V1.0.0.

Note

The elements in the Reference Sets do not expire by default. To ensure your Reference Sets are not overfilled, you can set an expiration date to the elements.

Table 4: Reference Data in JSA Cryptomining Content Extension V1.0.0

Type

Name

Description

Reference Set

Cryptocurrency Mining Hosts

Contains a list of cryptocurrency mining hosts.

Reference Set

Cryptocurrency Mining Javascript File Hashes

Contains a list of cryptocurrency mining Javascript file hashes.

Reference Set

Cryptocurrency Mining Threat Hashes

Contains a list of cryptocurrency mining threat file hashes.

Reference Set

Cryptocurrency Mining Javascript File Names

Contains a list of cryptocurrency mining Javascript file names.

Reference Set

Cryptocurrency Mining IPs

Contains a list of cryptocurrency mining IP addresses.

Reference Set

Cryptocurrency Mining Threat Names

Contains a list of cryptocurrency mining threat file names.

Reference Set

Cryptocurrency Mining Process Names

Contains a list of cryptocurrency mining processes.

The following table shows the saved searches in JSA Cryptomining Content Extension V1.0.0.

Table 5: Saved Searches in JSA Cryptomining Content Extension V1.0.0

Name

Description

Source Addresses with Cryptocurrency Mining Activities

Shows all events with cryptocurrency mining activities (triggered one of the rules) and groups them by source address and source port.

Destination Addresses with Cryptocurrency Mining Activities

Shows all events with cryptocurrency mining activities (triggered one of the rules) and groups them by destination address and destination port.

Source Addresses with Cryptocurrency Mining Activities

Shows all flows with cryptocurrency mining activities (triggered one of the rules) and groups them by source address and source port.

Destination Addresses with Cryptocurrency Mining Activities

Shows all flows with cryptocurrency mining activities (triggered one of the rules) and groups them by destination address and destination port.