Analysis Overview
SHA256
101841b25bb0e6ff21274daeab07b6d1a255dccdc2c292352ff24d4e502022f1
Threat Level: Known bad
The file 101841b25bb0e6ff21274daeab07b6d1a255dccdc2c292352ff24d4e502022f1.exe was found to be: Known bad.
Malicious Activity Summary
XMRig Miner payload
Cobaltstrike family
Xmrig family
xmrig
Cobalt Strike reflective loader
XMRig Miner payload
UPX packed file
Unsigned PE
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-11-13 21:51
Signatures
Cobalt Strike reflective loader
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Cobaltstrike family
XMRig Miner payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xmrig family
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-13 21:51
Reported
2024-11-13 21:53
Platform
win7-20241010-en
Max time kernel
107s
Max time network
123s
Command Line
Signatures
Xmrig family
xmrig
XMRig Miner payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeLockMemoryPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\101841b25bb0e6ff21274daeab07b6d1a255dccdc2c292352ff24d4e502022f1.exe | N/A |
| Token: SeLockMemoryPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\101841b25bb0e6ff21274daeab07b6d1a255dccdc2c292352ff24d4e502022f1.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\101841b25bb0e6ff21274daeab07b6d1a255dccdc2c292352ff24d4e502022f1.exe
"C:\Users\Admin\AppData\Local\Temp\101841b25bb0e6ff21274daeab07b6d1a255dccdc2c292352ff24d4e502022f1.exe"
Network
| Country | Destination | Domain | Proto |
| DE | 3.120.209.58:8080 | tcp | |
| DE | 3.120.209.58:8080 | tcp | |
| DE | 3.120.209.58:8080 | tcp | |
| DE | 3.120.209.58:8080 | tcp | |
| DE | 3.120.209.58:8080 | tcp |
Files
memory/1064-0-0x000000013F9F0000-0x000000013FD44000-memory.dmp
memory/1064-1-0x00000000000F0000-0x0000000000100000-memory.dmp
memory/1064-2-0x000000013F9F0000-0x000000013FD44000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-13 21:51
Reported
2024-11-13 21:53
Platform
win10v2004-20241007-en
Max time kernel
105s
Max time network
123s
Command Line
Signatures
Xmrig family
xmrig
XMRig Miner payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeLockMemoryPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\101841b25bb0e6ff21274daeab07b6d1a255dccdc2c292352ff24d4e502022f1.exe | N/A |
| Token: SeLockMemoryPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\101841b25bb0e6ff21274daeab07b6d1a255dccdc2c292352ff24d4e502022f1.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\101841b25bb0e6ff21274daeab07b6d1a255dccdc2c292352ff24d4e502022f1.exe
"C:\Users\Admin\AppData\Local\Temp\101841b25bb0e6ff21274daeab07b6d1a255dccdc2c292352ff24d4e502022f1.exe"
Network
| Country | Destination | Domain | Proto |
| DE | 3.120.209.58:8080 | tcp | |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| DE | 3.120.209.58:8080 | tcp | |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| DE | 3.120.209.58:8080 | tcp | |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| DE | 3.120.209.58:8080 | tcp | |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| DE | 3.120.209.58:8080 | tcp |
Files
memory/2640-0-0x00007FF6A1E20000-0x00007FF6A2174000-memory.dmp
memory/2640-1-0x000002AC535C0000-0x000002AC535D0000-memory.dmp
memory/2640-2-0x00007FF6A1E20000-0x00007FF6A2174000-memory.dmp