Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2023 09:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6b028fa9d1a7a351a93b33f8af2a7e66627847235434d9ef5b14efd70ae4f4ca.exe
Resource
win7-20231020-en
windows7-x64
3 signatures
150 seconds
General
-
Target
6b028fa9d1a7a351a93b33f8af2a7e66627847235434d9ef5b14efd70ae4f4ca.exe
-
Size
4.1MB
-
MD5
43feceeec82e4abaa5bb7b9fb403c87d
-
SHA1
a4bc2fb29243cecd2e781951eb9835a7733e7f15
-
SHA256
6b028fa9d1a7a351a93b33f8af2a7e66627847235434d9ef5b14efd70ae4f4ca
-
SHA512
0387ac4bfa359b356555956cfdcd3abab3974c47a1abad7d3e7f69f3d547821ade93fadf4bc684684a1aa3395fbb2af0bfb57b8404f4ff74e09b2fa69c688392
-
SSDEEP
98304:YmTOorm0jxrZjHI1RTEGF2AqOAnAWYz4CcgOMauembsz+bJIhvCgKHmb3LhAHkOz:YRUxrRYN0vrnAqBgheSFSLKGIkOJGE
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/408-3-0x00007FF70DC10000-0x00007FF70E943000-memory.dmp xmrig -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6b028fa9d1a7a351a93b33f8af2a7e66627847235434d9ef5b14efd70ae4f4ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6b028fa9d1a7a351a93b33f8af2a7e66627847235434d9ef5b14efd70ae4f4ca.exe