Analysis

  • max time kernel
    111s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 20:02

General

  • Target

    7660ffff422ea200f11ef43fc0437a32613e114fcab74298b7c333503849cf85.exe

  • Size

    1.4MB

  • MD5

    49fb84a5fc4a793642beb19414135e22

  • SHA1

    f4f0f0f95db0b03e8737db37fda0ea218f02e041

  • SHA256

    7660ffff422ea200f11ef43fc0437a32613e114fcab74298b7c333503849cf85

  • SHA512

    c9be6872e3a16b148751d3f1abd1d97872fb644f0d66e1e8c473c1ff9362b511522aa10dea77899cb05d68038d1d314625cf4bd9e041923de38044da4381a6bf

  • SSDEEP

    24576:RVIl/WDGCi7/qkat6zqxG2Z9mIhQvq8wd7NjVb65GsL9QsdkutxbVUDk+3HuP7n9:ROdWCCi7/raWMmSdbbUGsVOutxLzp

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 12 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7660ffff422ea200f11ef43fc0437a32613e114fcab74298b7c333503849cf85.exe
    "C:\Users\Admin\AppData\Local\Temp\7660ffff422ea200f11ef43fc0437a32613e114fcab74298b7c333503849cf85.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1872

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1872-0-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-1-0x00000264A6110000-0x00000264A6120000-memory.dmp

    Filesize

    64KB

  • memory/1872-2-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-3-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-4-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-5-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-6-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-7-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-8-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-9-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-10-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-11-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-12-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-13-0x00007FF754EB0000-0x00007FF755201000-memory.dmp

    Filesize

    3.3MB