Analysis

  • max time kernel
    111s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 00:23

General

  • Target

    508f6e3fef337b9622a5458a9348484bb3bbaf98ec11a0dc9783c31d2c1b5241.exe

  • Size

    1.8MB

  • MD5

    33dfef065db4f130d60ca0f553b66946

  • SHA1

    ff215dfee0c463173ac06a28dc1b9ff05e87c73c

  • SHA256

    508f6e3fef337b9622a5458a9348484bb3bbaf98ec11a0dc9783c31d2c1b5241

  • SHA512

    9c546d6f469fa901090569d75f9076d81bcb7df5b4ca7cc631f8d511a2f4374872c3d6129acfe4564c35a4a723be99d00e39225942c9328541a2eda602e86325

  • SSDEEP

    24576:JanwhSe11QSONCpGJCjETPlia+zW7MdbCbc5wJ+Ph8jiigOTFUOeOUn/zSsw2Qv6:knw9oUUEEDlZMVyc5K1jiiJTgmsEA

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 12 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\508f6e3fef337b9622a5458a9348484bb3bbaf98ec11a0dc9783c31d2c1b5241.exe
    "C:\Users\Admin\AppData\Local\Temp\508f6e3fef337b9622a5458a9348484bb3bbaf98ec11a0dc9783c31d2c1b5241.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2344-0-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-1-0x000001AB63590000-0x000001AB635A0000-memory.dmp

    Filesize

    64KB

  • memory/2344-2-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-3-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-4-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-5-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-6-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-7-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-8-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-9-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-10-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-11-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-12-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB

  • memory/2344-13-0x00007FF79CA60000-0x00007FF79CE51000-memory.dmp

    Filesize

    3.9MB