Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 22:01
Behavioral task
behavioral1
Sample
afc8a84f1e71eed8056108d7da81b121.exe
Resource
win7-20231215-en
General
-
Target
afc8a84f1e71eed8056108d7da81b121.exe
-
Size
784KB
-
MD5
afc8a84f1e71eed8056108d7da81b121
-
SHA1
78f1179d7a15b6ed200fdcea125cb0528613fd40
-
SHA256
f00ebd78ac0cb3c529cb5c4c05a036b784a556bf71f0b02266e1cfe9ac584b50
-
SHA512
62d3232fbceb4d7d54f52fa1e6d038b24b82af9428e89799ff2c3c04d7b752231d99d0e2b2b880f217df93f79159caf089973735e3bbb49695f49c5ef698a6ec
-
SSDEEP
24576:MBeJt4/PF98nmmrugw61wBfT5krVS3Ze:MBe4nF98nBrA1BfTm5Spe
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1412-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1412-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4644-16-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4644-22-0x0000000005400000-0x0000000005593000-memory.dmp xmrig behavioral2/memory/4644-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4644-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4644 afc8a84f1e71eed8056108d7da81b121.exe -
Executes dropped EXE 1 IoCs
pid Process 4644 afc8a84f1e71eed8056108d7da81b121.exe -
resource yara_rule behavioral2/memory/1412-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0009000000023221-11.dat upx behavioral2/memory/4644-14-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1412 afc8a84f1e71eed8056108d7da81b121.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1412 afc8a84f1e71eed8056108d7da81b121.exe 4644 afc8a84f1e71eed8056108d7da81b121.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1412 wrote to memory of 4644 1412 afc8a84f1e71eed8056108d7da81b121.exe 92 PID 1412 wrote to memory of 4644 1412 afc8a84f1e71eed8056108d7da81b121.exe 92 PID 1412 wrote to memory of 4644 1412 afc8a84f1e71eed8056108d7da81b121.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc8a84f1e71eed8056108d7da81b121.exe"C:\Users\Admin\AppData\Local\Temp\afc8a84f1e71eed8056108d7da81b121.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\afc8a84f1e71eed8056108d7da81b121.exeC:\Users\Admin\AppData\Local\Temp\afc8a84f1e71eed8056108d7da81b121.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4644
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD568da9063ee9e90c12758dc6537a524b9
SHA157b5e147b2ac3a49d22f5c328809efde942afc5a
SHA256193807c44625a0edb8c3be54dcbf4640cad9ed57890786e1bdab7764855526bf
SHA512c90c76f4867f7567f0c665f8aad6fd125d55106e10ce09412d8aa0b82dfcc5bd1d56cf70284ad70e2632afa9aedde55b603ddd66c8255174baee5ec80d5f2225