Analysis
-
max time kernel
105s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
4488382c9b8763f7462dd4c76bc6fcafbd1a4d43840d606b60e028bf95bdd7ab.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
4488382c9b8763f7462dd4c76bc6fcafbd1a4d43840d606b60e028bf95bdd7ab.exe
-
Size
5.9MB
-
MD5
b9d956a6355f579e42e5e39c92866b76
-
SHA1
335089df114785c6f240b4c5aead9ae25a59a7f5
-
SHA256
4488382c9b8763f7462dd4c76bc6fcafbd1a4d43840d606b60e028bf95bdd7ab
-
SHA512
720c87b5e29464f4b62ab1bf795605df463e0ee10b3641891073c3400f9229efd4544b4c13b4bd881574cc21eddcc63535b7e2cf43767803fbd9568b31182c7c
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4300-130-0x00007FF633D20000-0x00007FF634074000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/4300-130-0x00007FF633D20000-0x00007FF634074000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4300-130-0x00007FF633D20000-0x00007FF634074000-memory.dmpFilesize
3.3MB