Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
3dd5f9acef213e5cd84f54cd05dd02a671fb62fa778e997c532fed7868594351.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3dd5f9acef213e5cd84f54cd05dd02a671fb62fa778e997c532fed7868594351.exe
-
Size
5.9MB
-
MD5
2a19506cc53a25f8417fe1e4b282623b
-
SHA1
be66fa92612eeb5ffc95d848341f1be4516a610e
-
SHA256
3dd5f9acef213e5cd84f54cd05dd02a671fb62fa778e997c532fed7868594351
-
SHA512
edc2c69ac918fa7ac9d674b5994ca0d40deb0d1bc88a1380f67589a7807fb68dcbb52cd92c8e287531ef1db34784c503dd9db79ffd184b908d77a8452b975766
Malware Config
Signatures
-
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4172-130-0x00007FF6B5A60000-0x00007FF6B5DB4000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/4172-130-0x00007FF6B5A60000-0x00007FF6B5DB4000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4172-130-0x00007FF6B5A60000-0x00007FF6B5DB4000-memory.dmpFilesize
3.3MB