Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    13-05-2021 12:57

General

  • Target

    423eb3ee1dca6dac105f68812619c8d77643dbb0d082ae24ef7fc42b93d3e843.exe

  • Size

    3.4MB

  • MD5

    b8686eb397b6f0cdafce7ae4cc3927d9

  • SHA1

    cf2e6c163ec592095941d95e7e1fffa2d556b114

  • SHA256

    423eb3ee1dca6dac105f68812619c8d77643dbb0d082ae24ef7fc42b93d3e843

  • SHA512

    adac4ebddaa99f1bf2444cc4d160cbf4e6eaff8397c15017cc9f444e05985c03a5fa1bf5ed0068d0af5f31aa82a37d968635cc4a8cf81016967d0409297c5431

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\423eb3ee1dca6dac105f68812619c8d77643dbb0d082ae24ef7fc42b93d3e843.exe
    "C:\Users\Admin\AppData\Local\Temp\423eb3ee1dca6dac105f68812619c8d77643dbb0d082ae24ef7fc42b93d3e843.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\$$$$$.bat
      2⤵
      • Deletes itself
      PID:1652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\$$$$$.bat
    MD5

    e5c16518d9bc9565a3c2074170a04490

    SHA1

    db97d2ae53737f43badcfb298c6eb2952c22b4ff

    SHA256

    7ed516ddd607ef5f3c6e5a4294143f36cacdda0b004e8e949075e6981617f0e9

    SHA512

    864285ee2ee2a734b5a04a64a7ba7d74686334ff9d66b843f287fd4a9502daf7e4c19ac55cfefdc31d1b1c264b60d7f83d27da3a330795d4583ff78c99c87bd6

  • memory/1652-60-0x0000000000000000-mapping.dmp