Analysis
-
max time kernel
90s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 07:12
Static task
static1
Behavioral task
behavioral1
Sample
afcabc4879b2caa194fa37d82932a2c9213c721bfb164730bdd3026c4973e95b.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
afcabc4879b2caa194fa37d82932a2c9213c721bfb164730bdd3026c4973e95b.exe
-
Size
5.9MB
-
MD5
d0617ac2c63174084e17e4d6ef5d7d6b
-
SHA1
2ba9173fb1157aaedcd6205a6c635da80215113d
-
SHA256
afcabc4879b2caa194fa37d82932a2c9213c721bfb164730bdd3026c4973e95b
-
SHA512
64e4e1066da8c66470d01679a8de353492139ebffcde3d8ea1bb2ff48dabc47ca9f16fa47780978dbc901e482df45a8f8583f5e446a5123a505c2d4e3414259f
Malware Config
Signatures
-
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1636-130-0x00007FF759260000-0x00007FF7595B4000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/1636-130-0x00007FF759260000-0x00007FF7595B4000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1636-130-0x00007FF759260000-0x00007FF7595B4000-memory.dmpFilesize
3.3MB