Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 05:54
Behavioral task
behavioral1
Sample
aff25f9b4ae765d701f76d9f69749d809d18c83ac190ad750c00c221726492a6.exe
Resource
win7-20221111-en
windows7-x64
10 signatures
150 seconds
General
-
Target
aff25f9b4ae765d701f76d9f69749d809d18c83ac190ad750c00c221726492a6.exe
-
Size
5.9MB
-
MD5
db7ace6a02b5a6a2aeed0d5bd86f376d
-
SHA1
858c7027c284e6415c72c1dc8173d6a0342b2b72
-
SHA256
aff25f9b4ae765d701f76d9f69749d809d18c83ac190ad750c00c221726492a6
-
SHA512
7b793813d336ce24f86cfbf5e6de237d45e596d596e7456101e8032e8f1bf0eaff1fd2660f95eebe367b31412f04bb86804a2ecec7e765d41c3f8405d72584b6
-
SSDEEP
98304:demTLkNdfE0pZ3u56utgpPFotBER/mQ32lUG:E+b56utgpPF8u/7G
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3436-132-0x00007FF66C200000-0x00007FF66C554000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/3436-132-0x00007FF66C200000-0x00007FF66C554000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3436-132-0x00007FF66C200000-0x00007FF66C554000-memory.dmpFilesize
3.3MB