Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2025 04:55

General

  • Target

    663d5ff83c34cd1f36d14f18840213b60b943504336dc9a92e9e66e261a0aa98.exe

  • Size

    1008KB

  • MD5

    8f2677a73a12f4072144416dc455ae6a

  • SHA1

    2ba7d3345ab87deb010229ece65279d11ad56b69

  • SHA256

    663d5ff83c34cd1f36d14f18840213b60b943504336dc9a92e9e66e261a0aa98

  • SHA512

    52e68a214b3e31571c11b506a060cba01d319724b156a6ca3280f95c87b646982df89bd91f4421e643ae6767a5b8067ee122762d9736ae6f557a39ca8af94786

  • SSDEEP

    24576:JanwhSe11QSONCpGJCjETPl+Me7bPMS5bcsf7r9Kn:knw9oUUEEDl+xTMSTy

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 12 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\663d5ff83c34cd1f36d14f18840213b60b943504336dc9a92e9e66e261a0aa98.exe
    "C:\Users\Admin\AppData\Local\Temp\663d5ff83c34cd1f36d14f18840213b60b943504336dc9a92e9e66e261a0aa98.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2520-0-0x0000000000180000-0x0000000000190000-memory.dmp

    Filesize

    64KB

  • memory/2520-1-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-2-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-3-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-4-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-5-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-6-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-7-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-8-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-9-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-10-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-11-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-12-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB

  • memory/2520-13-0x000000013F0C0000-0x000000013F4B1000-memory.dmp

    Filesize

    3.9MB