Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2023 13:41
Behavioral task
behavioral1
Sample
4df16f264b2b42exeexe_JC.exe
Resource
win7-20230712-en
windows7-x64
9 signatures
150 seconds
General
-
Target
4df16f264b2b42exeexe_JC.exe
-
Size
6.0MB
-
MD5
4df16f264b2b4245473e6b9ad05e0a42
-
SHA1
d187ff8cbb1037ed310499788a7a52a421bf1e4c
-
SHA256
95de5a2582af23bd342a746af01c9c01ac301bb70b7d2b5ebcc46de86c113ea4
-
SHA512
9ec71adf22f4cb3b1b87fe51b8d8f092e256fd5f2430f85e8ce086208850aca2a553d47a96747aab15b03b84e3fcc54d21122498ed9bfa24624156a896ea80bc
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lU8:eOl56utgpPF8u/78
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/100-133-0x00007FF72FAE0000-0x00007FF72FE34000-memory.dmp xmrig behavioral2/memory/100-134-0x00007FF72FAE0000-0x00007FF72FE34000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/100-133-0x00007FF72FAE0000-0x00007FF72FE34000-memory.dmp upx