Analysis

  • max time kernel
    138s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    01-07-2022 06:36

General

  • Target

    d6e18bf5d9d0691637e77205082244b223ebfc1860491780e014458e05a19c9e.exe

  • Size

    5.9MB

  • MD5

    b6c197d77b6c607fa8a806561a8b2171

  • SHA1

    1927406908841425dc6fb5a26e5993f06ccd96d4

  • SHA256

    d6e18bf5d9d0691637e77205082244b223ebfc1860491780e014458e05a19c9e

  • SHA512

    5f40a55b51ff83e503a406aa69bfaeab7ece33abde5a561768a947b102c6ffff0fed4965f8f6874e8331a6f3e0fed277a869c7731c2f89a6b8a9cf6f812669ce

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6e18bf5d9d0691637e77205082244b223ebfc1860491780e014458e05a19c9e.exe
    "C:\Users\Admin\AppData\Local\Temp\d6e18bf5d9d0691637e77205082244b223ebfc1860491780e014458e05a19c9e.exe"
    1⤵
      PID:2152

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2152-130-0x00007FF654250000-0x00007FF6545A4000-memory.dmp
      Filesize

      3.3MB