Analysis

  • max time kernel
    137s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    01-07-2022 06:13

General

  • Target

    ac5c2cfc1b287f6ee8f420b712883c27113abd9e9cafb48b3cc8eb83416ff4f2.exe

  • Size

    5.9MB

  • MD5

    c4caa38dc46e882bde32da9c6d0101b3

  • SHA1

    d3ed7f691e6c6d216b7418d4082eaba728409562

  • SHA256

    ac5c2cfc1b287f6ee8f420b712883c27113abd9e9cafb48b3cc8eb83416ff4f2

  • SHA512

    c3c5a64ed29cfea78d766d1fb324fabd32c6c6da7c8fd69716040c350a8e0382b63f703fc8c5a5e691e477e2eea13fd972ac2d42a7f6b16ac99d7eb86ebe46de

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac5c2cfc1b287f6ee8f420b712883c27113abd9e9cafb48b3cc8eb83416ff4f2.exe
    "C:\Users\Admin\AppData\Local\Temp\ac5c2cfc1b287f6ee8f420b712883c27113abd9e9cafb48b3cc8eb83416ff4f2.exe"
    1⤵
      PID:3376

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3376-130-0x00007FF7271D0000-0x00007FF727524000-memory.dmp
      Filesize

      3.3MB