Analysis
-
max time kernel
163s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 03:14
Static task
static1
Behavioral task
behavioral1
Sample
423a17748dbb1c1492dc0fae68f4021f17c928810e93f7506011605a3c911257.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
423a17748dbb1c1492dc0fae68f4021f17c928810e93f7506011605a3c911257.exe
-
Size
5.9MB
-
MD5
b5d3b34c20f75dd4f5b2f1a4d4dc44dd
-
SHA1
acc6ad08bb1076a4ffb017554ae02c7a51668448
-
SHA256
423a17748dbb1c1492dc0fae68f4021f17c928810e93f7506011605a3c911257
-
SHA512
87e22233f17dad381cf725c72e01f9d956f52e845a6599b16fb06a23d310be472daafcdcb5a7541a1b36abf5357f66753fbcac97984742af7c7b31211590ebe4
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4224-130-0x00007FF6AB230000-0x00007FF6AB584000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/4224-130-0x00007FF6AB230000-0x00007FF6AB584000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4224-130-0x00007FF6AB230000-0x00007FF6AB584000-memory.dmpFilesize
3.3MB