Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 05:57
Static task
static1
Behavioral task
behavioral1
Sample
936e0ad5fcfc09a85234ac06d23bb2de6671d55c2d3f9f75fc6e7a57cbf94892.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
936e0ad5fcfc09a85234ac06d23bb2de6671d55c2d3f9f75fc6e7a57cbf94892.exe
-
Size
5.9MB
-
MD5
aa0719c8bd0fb1c5199948fc6a2ac031
-
SHA1
328a44495aa9d4bc78a500869829e97aa89f341f
-
SHA256
936e0ad5fcfc09a85234ac06d23bb2de6671d55c2d3f9f75fc6e7a57cbf94892
-
SHA512
134bb11092fe0a61eb481ae1c3e34e527b22c8e0f9c37ce86acdba9028ee2292750afdbd2bd37c657756a26f00ffd0aba3762c885b37f1470d92b6a364d2ac35
Malware Config
Signatures
-
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/900-130-0x00007FF79D690000-0x00007FF79D9E4000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/900-130-0x00007FF79D690000-0x00007FF79D9E4000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/900-130-0x00007FF79D690000-0x00007FF79D9E4000-memory.dmpFilesize
3.3MB