Analysis
-
max time kernel
90s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 10:35
Behavioral task
behavioral1
Sample
08d8036da2cfcdf8b1883d589e37c152.exe
Resource
win7-20231215-en
General
-
Target
08d8036da2cfcdf8b1883d589e37c152.exe
-
Size
3.1MB
-
MD5
08d8036da2cfcdf8b1883d589e37c152
-
SHA1
7013d97b566c9fd324d5fd6aec7e2c82f706d58a
-
SHA256
a032a8fe41816cb3b2d932e7219e116cb86d932867a984684f29530b98509690
-
SHA512
2de770e8e0b03c1d39bcddc27048a472d269e4ab4a832a5acedfc00a158e16a37c032094aa618ed1d422c7b376c4c30f21cb743e6fba1720336385002872af7f
-
SSDEEP
98304:ez5djsBQ3huE8hZhbPPeiQtx550oFJyRCKI4RoI/K:coBQRMZhbOR9qgJyHaY
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3508-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3508-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3432-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3432-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3432-21-0x00000000053D0000-0x0000000005563000-memory.dmp xmrig behavioral2/memory/3432-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3432 08d8036da2cfcdf8b1883d589e37c152.exe -
Executes dropped EXE 1 IoCs
pid Process 3432 08d8036da2cfcdf8b1883d589e37c152.exe -
resource yara_rule behavioral2/memory/3508-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000c000000023165-11.dat upx behavioral2/memory/3432-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3508 08d8036da2cfcdf8b1883d589e37c152.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3508 08d8036da2cfcdf8b1883d589e37c152.exe 3432 08d8036da2cfcdf8b1883d589e37c152.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3508 wrote to memory of 3432 3508 08d8036da2cfcdf8b1883d589e37c152.exe 88 PID 3508 wrote to memory of 3432 3508 08d8036da2cfcdf8b1883d589e37c152.exe 88 PID 3508 wrote to memory of 3432 3508 08d8036da2cfcdf8b1883d589e37c152.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\08d8036da2cfcdf8b1883d589e37c152.exe"C:\Users\Admin\AppData\Local\Temp\08d8036da2cfcdf8b1883d589e37c152.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\08d8036da2cfcdf8b1883d589e37c152.exeC:\Users\Admin\AppData\Local\Temp\08d8036da2cfcdf8b1883d589e37c152.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3432
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5021ea21af71c9aa622e9b0857d517850
SHA14bd74829b2110970ba422988c666a0bc9497c593
SHA256f74740b8e6cc08861175b82b6e6207afcd3f5a79e3bbad4c938cd20d1710c9af
SHA51255afc59a7666c99e683b2e2efeb49c2337c2a2d22cff45e7fb59b4708f0a669353a036677225e301dfc6e0933075784d69d27d952b95a4b772599cc93c628959