Analysis
-
max time kernel
141s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 06:56
Static task
static1
Behavioral task
behavioral1
Sample
cf1125327aeff3db07186d72ff56d44c77806c76bb6c356ebd9b561f3bd38306.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
cf1125327aeff3db07186d72ff56d44c77806c76bb6c356ebd9b561f3bd38306.exe
-
Size
5.9MB
-
MD5
8330921260d511f31647bea0fdbf36ff
-
SHA1
2a42b2c237118e8b6015c4ac76fb83b3de424f1a
-
SHA256
cf1125327aeff3db07186d72ff56d44c77806c76bb6c356ebd9b561f3bd38306
-
SHA512
edc75392d45c3a0e0f001aceaf22cef13faf3b4dd9de079038a59e8db807896b8806cccaade5b3fe0875e1c35a66dce8ea07c19c762973d5f6a5cee89abfaa17
Malware Config
Signatures
-
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5004-130-0x00007FF773020000-0x00007FF773374000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/5004-130-0x00007FF773020000-0x00007FF773374000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5004-130-0x00007FF773020000-0x00007FF773374000-memory.dmpFilesize
3.3MB