Analysis

  • max time kernel
    141s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    01-07-2022 06:56

General

  • Target

    cf1125327aeff3db07186d72ff56d44c77806c76bb6c356ebd9b561f3bd38306.exe

  • Size

    5.9MB

  • MD5

    8330921260d511f31647bea0fdbf36ff

  • SHA1

    2a42b2c237118e8b6015c4ac76fb83b3de424f1a

  • SHA256

    cf1125327aeff3db07186d72ff56d44c77806c76bb6c356ebd9b561f3bd38306

  • SHA512

    edc75392d45c3a0e0f001aceaf22cef13faf3b4dd9de079038a59e8db807896b8806cccaade5b3fe0875e1c35a66dce8ea07c19c762973d5f6a5cee89abfaa17

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf1125327aeff3db07186d72ff56d44c77806c76bb6c356ebd9b561f3bd38306.exe
    "C:\Users\Admin\AppData\Local\Temp\cf1125327aeff3db07186d72ff56d44c77806c76bb6c356ebd9b561f3bd38306.exe"
    1⤵
      PID:5004

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5004-130-0x00007FF773020000-0x00007FF773374000-memory.dmp
      Filesize

      3.3MB