Analysis

  • max time kernel
    163s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-07-2022 03:14

General

  • Target

    423a17748dbb1c1492dc0fae68f4021f17c928810e93f7506011605a3c911257.exe

  • Size

    5.9MB

  • MD5

    b5d3b34c20f75dd4f5b2f1a4d4dc44dd

  • SHA1

    acc6ad08bb1076a4ffb017554ae02c7a51668448

  • SHA256

    423a17748dbb1c1492dc0fae68f4021f17c928810e93f7506011605a3c911257

  • SHA512

    87e22233f17dad381cf725c72e01f9d956f52e845a6599b16fb06a23d310be472daafcdcb5a7541a1b36abf5357f66753fbcac97984742af7c7b31211590ebe4

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\423a17748dbb1c1492dc0fae68f4021f17c928810e93f7506011605a3c911257.exe
    "C:\Users\Admin\AppData\Local\Temp\423a17748dbb1c1492dc0fae68f4021f17c928810e93f7506011605a3c911257.exe"
    1⤵
      PID:4224

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4224-130-0x00007FF6AB230000-0x00007FF6AB584000-memory.dmp
      Filesize

      3.3MB