Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 03:40
Static task
static1
Behavioral task
behavioral1
Sample
4215e87e7c3338c0a28dc8923f0f17fae602d8d1005ea29bd4becafef4e5cdfb.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
4215e87e7c3338c0a28dc8923f0f17fae602d8d1005ea29bd4becafef4e5cdfb.exe
-
Size
5.9MB
-
MD5
f57e1c1b0968adaca8eab94f200299d6
-
SHA1
38d2ca1ff3dfb127f8a0aa004e65a32e285c2b11
-
SHA256
4215e87e7c3338c0a28dc8923f0f17fae602d8d1005ea29bd4becafef4e5cdfb
-
SHA512
d5d199adc2fb6df9b147fa93843573b150dc6178b9ccff72b983449eb1e0202941e7f75d5e7411e06a5cbfb3ad277275eb839c7d449c9dbd284a2e754bd852af
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4980-130-0x00007FF691A90000-0x00007FF691DE4000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/4980-130-0x00007FF691A90000-0x00007FF691DE4000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4980-130-0x00007FF691A90000-0x00007FF691DE4000-memory.dmpFilesize
3.3MB