Analysis

  • max time kernel
    110s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 20:11

General

  • Target

    0571b07d01b828501926a6d96f7b3228cafc9e84a74ced560f6cd6cc01fc9740.exe

  • Size

    833KB

  • MD5

    d24e31562d9ffaad2f37b81864f1d457

  • SHA1

    bec265c17c289911ed35c0ef83d8799cdd88da0d

  • SHA256

    0571b07d01b828501926a6d96f7b3228cafc9e84a74ced560f6cd6cc01fc9740

  • SHA512

    2e8f674a5d4424d206feee65533e236da0cc1b00f92de7be8d86e0f8ef5b7f5b439c5d6662aaff010c9b27dbaa0671b78a9c2d09ea8e3c49d639bd8b34ac790f

  • SSDEEP

    24576:JanwhSe11QSONCpGJCjETPlia+zzDwd+kYiS:knw9oUUEEDlnd+X

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 12 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0571b07d01b828501926a6d96f7b3228cafc9e84a74ced560f6cd6cc01fc9740.exe
    "C:\Users\Admin\AppData\Local\Temp\0571b07d01b828501926a6d96f7b3228cafc9e84a74ced560f6cd6cc01fc9740.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/468-0-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-1-0x0000015B7E760000-0x0000015B7E770000-memory.dmp

    Filesize

    64KB

  • memory/468-2-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-3-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-4-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-5-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-6-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-7-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-8-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-9-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-10-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-11-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-12-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB

  • memory/468-13-0x00007FF733A50000-0x00007FF733E41000-memory.dmp

    Filesize

    3.9MB