Analysis
-
max time kernel
64s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 05:00
Static task
static1
Behavioral task
behavioral1
Sample
e3300777e9556774accd676909085582a0c3a78897c9e1017ea326af260b6ce9.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
e3300777e9556774accd676909085582a0c3a78897c9e1017ea326af260b6ce9.exe
-
Size
5.9MB
-
MD5
1c962920e15c2c333e890fb687aa2350
-
SHA1
ed05e2c1667133759809b6842e174e5f27f36795
-
SHA256
e3300777e9556774accd676909085582a0c3a78897c9e1017ea326af260b6ce9
-
SHA512
a6e8e97f5ef7eda54277bb3de221d100e760f11b3b73110bdb096389429600f46b9ff368ebcc71097de59d069156d445fcccb77e4ca392eb80cb6d15ee1efd5f
Malware Config
Signatures
-
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4196-130-0x00007FF6A6440000-0x00007FF6A6794000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/4196-130-0x00007FF6A6440000-0x00007FF6A6794000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4196-130-0x00007FF6A6440000-0x00007FF6A6794000-memory.dmpFilesize
3.3MB