Analysis

  • max time kernel
    137s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 02:58

General

  • Target

    c19dd71d27e7dc95e8541e50b0a467d67b68c5c45e9331a7d76c920ba5c57505.exe

  • Size

    2.4MB

  • MD5

    e46281bd51342e5d790eec9b2a8c68c8

  • SHA1

    6152e0012be4f37e75ac70f64a05cf36595420e5

  • SHA256

    c19dd71d27e7dc95e8541e50b0a467d67b68c5c45e9331a7d76c920ba5c57505

  • SHA512

    5a95476946201a93417ce161072e1f50c3ba364e8b05a39f3602e987a5d2f445108aac41913761be51c5bd218792a2049affeb242f0161404e52c2b00d87fa7e

  • SSDEEP

    49152:BezaTF8FcNkNdfE0pZ9ozt4wIC5aIwC+Agr6StVEnmcKrwwyGwSw3d:BemTLkNdfE0pZrwx

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c19dd71d27e7dc95e8541e50b0a467d67b68c5c45e9331a7d76c920ba5c57505.exe
    "C:\Users\Admin\AppData\Local\Temp\c19dd71d27e7dc95e8541e50b0a467d67b68c5c45e9331a7d76c920ba5c57505.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4060-0-0x00007FF7D0520000-0x00007FF7D0874000-memory.dmp

    Filesize

    3.3MB

  • memory/4060-1-0x00000115274C0000-0x00000115274D0000-memory.dmp

    Filesize

    64KB

  • memory/4060-2-0x00007FF7D0520000-0x00007FF7D0874000-memory.dmp

    Filesize

    3.3MB