Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2023 09:03

General

  • Target

    6b028fa9d1a7a351a93b33f8af2a7e66627847235434d9ef5b14efd70ae4f4ca.exe

  • Size

    4.1MB

  • MD5

    43feceeec82e4abaa5bb7b9fb403c87d

  • SHA1

    a4bc2fb29243cecd2e781951eb9835a7733e7f15

  • SHA256

    6b028fa9d1a7a351a93b33f8af2a7e66627847235434d9ef5b14efd70ae4f4ca

  • SHA512

    0387ac4bfa359b356555956cfdcd3abab3974c47a1abad7d3e7f69f3d547821ade93fadf4bc684684a1aa3395fbb2af0bfb57b8404f4ff74e09b2fa69c688392

  • SSDEEP

    98304:YmTOorm0jxrZjHI1RTEGF2AqOAnAWYz4CcgOMauembsz+bJIhvCgKHmb3LhAHkOz:YRUxrRYN0vrnAqBgheSFSLKGIkOJGE

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b028fa9d1a7a351a93b33f8af2a7e66627847235434d9ef5b14efd70ae4f4ca.exe
    "C:\Users\Admin\AppData\Local\Temp\6b028fa9d1a7a351a93b33f8af2a7e66627847235434d9ef5b14efd70ae4f4ca.exe"
    1⤵
    • Checks BIOS information in registry
    PID:408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/408-0-0x00007FF70DC10000-0x00007FF70E943000-memory.dmp

    Filesize

    13.2MB

  • memory/408-2-0x000002C3D2190000-0x000002C3D21B0000-memory.dmp

    Filesize

    128KB

  • memory/408-1-0x00007FFE8B630000-0x00007FFE8B825000-memory.dmp

    Filesize

    2.0MB

  • memory/408-3-0x00007FF70DC10000-0x00007FF70E943000-memory.dmp

    Filesize

    13.2MB

  • memory/408-4-0x00007FFE8B630000-0x00007FFE8B825000-memory.dmp

    Filesize

    2.0MB