Analysis
-
max time kernel
71s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05-07-2023 07:05
Behavioral task
behavioral1
Sample
miner79.exe
Resource
win7-20230703-en
General
-
Target
miner79.exe
-
Size
784KB
-
MD5
9ace289389fd688460a29f08b1c1acbe
-
SHA1
2b338272e805b3ece794d2fe5d834d0510c319f3
-
SHA256
e24033a0af118f6a215d79fc956b3e5faddada5590c898dd04e4a7a8ddfa3e99
-
SHA512
4737d45094336190173ea99e7a5aef25eefd5f5506ee1f8a4b16bbfba6cd2a57f1e868c1bd13844e943f96209a4821c24f5e2dd6ddd1afe9466d02a51880d128
-
SSDEEP
12288:VzcKiTllC/oixkDKVRDl8Vg35ff5VP6VRWizyL+SSDNEc7HvtnY0Sz0Kch+m5fZ0:KKollyhO+dPKWieL+hhEEYfch+m7DnA
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2064-54-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2064-67-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2912-69-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2912-74-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2912-84-0x0000000003220000-0x00000000033B3000-memory.dmp xmrig behavioral1/memory/2912-85-0x0000000000400000-0x0000000000712000-memory.dmp xmrig behavioral1/memory/2912-86-0x0000000000400000-0x0000000000712000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2912 miner79.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 miner79.exe -
Loads dropped DLL 1 IoCs
pid Process 2064 miner79.exe -
resource yara_rule behavioral1/files/0x000d000000012273-62.dat upx behavioral1/files/0x000d000000012273-66.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2064 miner79.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2064 miner79.exe 2912 miner79.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2912 2064 miner79.exe 29 PID 2064 wrote to memory of 2912 2064 miner79.exe 29 PID 2064 wrote to memory of 2912 2064 miner79.exe 29 PID 2064 wrote to memory of 2912 2064 miner79.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\miner79.exe"C:\Users\Admin\AppData\Local\Temp\miner79.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\miner79.exeC:\Users\Admin\AppData\Local\Temp\miner79.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2912
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5ce886cb5737144847e03c927689f1a8c
SHA11fdb97dd1ad4d3f08f97b01dc3b0f4d59490beac
SHA2560207faa728b1ac638a7a2e36c67c01c72d2a51361fe159661e4fcfb1087cf13a
SHA512a6b689d73faf3ac242787194c3550f6ff8aec11061ec6878a44b5a04092abad35ad434438ef3d6e8444fe43d214b4b177f06a8c04bc6aac2f9c0ce913bb05c82
-
Filesize
784KB
MD5ce886cb5737144847e03c927689f1a8c
SHA11fdb97dd1ad4d3f08f97b01dc3b0f4d59490beac
SHA2560207faa728b1ac638a7a2e36c67c01c72d2a51361fe159661e4fcfb1087cf13a
SHA512a6b689d73faf3ac242787194c3550f6ff8aec11061ec6878a44b5a04092abad35ad434438ef3d6e8444fe43d214b4b177f06a8c04bc6aac2f9c0ce913bb05c82