Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-07-2022 08:29

General

  • Target

    40e79b79ffb0eaf8bcfbc931dbeb1196cf743b49fb87736c4294334c6dde25dd.exe

  • Size

    5.9MB

  • MD5

    59d3841285f2b75806993ddd149d0922

  • SHA1

    94d62013c083c778e824634b44e23af23e44c220

  • SHA256

    40e79b79ffb0eaf8bcfbc931dbeb1196cf743b49fb87736c4294334c6dde25dd

  • SHA512

    868886fdf9bb1544667de59c5baa92178dc15490ac651823217a36e9883ce14a4a7db45e0d7545ca44a4f75d284122b5c242f4f418fd4d00b39e0c05f112ec91

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40e79b79ffb0eaf8bcfbc931dbeb1196cf743b49fb87736c4294334c6dde25dd.exe
    "C:\Users\Admin\AppData\Local\Temp\40e79b79ffb0eaf8bcfbc931dbeb1196cf743b49fb87736c4294334c6dde25dd.exe"
    1⤵
      PID:2784

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2784-130-0x00007FF78A780000-0x00007FF78AAD4000-memory.dmp
      Filesize

      3.3MB