Analysis
-
max time kernel
137s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 06:13
Static task
static1
Behavioral task
behavioral1
Sample
ac5c2cfc1b287f6ee8f420b712883c27113abd9e9cafb48b3cc8eb83416ff4f2.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
ac5c2cfc1b287f6ee8f420b712883c27113abd9e9cafb48b3cc8eb83416ff4f2.exe
-
Size
5.9MB
-
MD5
c4caa38dc46e882bde32da9c6d0101b3
-
SHA1
d3ed7f691e6c6d216b7418d4082eaba728409562
-
SHA256
ac5c2cfc1b287f6ee8f420b712883c27113abd9e9cafb48b3cc8eb83416ff4f2
-
SHA512
c3c5a64ed29cfea78d766d1fb324fabd32c6c6da7c8fd69716040c350a8e0382b63f703fc8c5a5e691e477e2eea13fd972ac2d42a7f6b16ac99d7eb86ebe46de
Malware Config
Signatures
-
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3376-130-0x00007FF7271D0000-0x00007FF727524000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/3376-130-0x00007FF7271D0000-0x00007FF727524000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3376-130-0x00007FF7271D0000-0x00007FF727524000-memory.dmpFilesize
3.3MB