Analysis

  • max time kernel
    114s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2025 05:48

General

  • Target

    336dea7422e5461158b8191be88aedb7d0c72ff82adbee3ecccef94ca2758d92.exe

  • Size

    1.4MB

  • MD5

    e40ead81d80053f6bcb415c514a33a69

  • SHA1

    2dae9a5011c18eb85ba920627cd9af04a02b8147

  • SHA256

    336dea7422e5461158b8191be88aedb7d0c72ff82adbee3ecccef94ca2758d92

  • SHA512

    da263f8ed70c805fa977aacbee100e40de162244116e8a55ee2e6694d265c7de8128e8463b2713664e0bba2f8c560d5f6e498ed37ce031c17b457ae97ac320af

  • SSDEEP

    24576:JanwhSe11QSONCpGJCjETPlGC78XCejIODose0nFRMbvUS6hufJ42:knw9oUUEEDlGUrMA0FcKho

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 12 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\336dea7422e5461158b8191be88aedb7d0c72ff82adbee3ecccef94ca2758d92.exe
    "C:\Users\Admin\AppData\Local\Temp\336dea7422e5461158b8191be88aedb7d0c72ff82adbee3ecccef94ca2758d92.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4980

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4980-0-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-1-0x0000024DC8860000-0x0000024DC8870000-memory.dmp

    Filesize

    64KB

  • memory/4980-2-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-3-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-4-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-5-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-6-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-7-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-8-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-9-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-10-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-11-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-12-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB

  • memory/4980-13-0x00007FF73E6A0000-0x00007FF73EA91000-memory.dmp

    Filesize

    3.9MB