Analysis
-
max time kernel
100s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 12:27
Behavioral task
behavioral1
Sample
21c6675e32b96719034264b498d11771.exe
Resource
win7-20231215-en
General
-
Target
21c6675e32b96719034264b498d11771.exe
-
Size
2.3MB
-
MD5
21c6675e32b96719034264b498d11771
-
SHA1
6fb20ff48034fad1a12d4f009218fc58e74df94c
-
SHA256
ead49f2fdd1944325e3bfcd8a88291ec9085c4d010b778bbbdf35328fbf1ce40
-
SHA512
9ece2b0274db77a503290dca90ba82492b44618958b2a9b5650a24d771754e3994cf59cc5653daa0a90f6d8eecb83148a9077dbf374406baf1c95c19f21cbaf4
-
SSDEEP
49152:mwqSKlk1yyF3q+28XDiO5Sr+onVw06ZEoUCwC7r1U8baCV1LPlO:mLl3M33TiOzN06f7S8bFvLPg
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3480-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3480-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2212-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2212-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2212-21-0x00000000054E0000-0x0000000005673000-memory.dmp xmrig behavioral2/memory/2212-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2212 21c6675e32b96719034264b498d11771.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 21c6675e32b96719034264b498d11771.exe -
resource yara_rule behavioral2/memory/3480-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000300000001e982-11.dat upx behavioral2/memory/2212-12-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3480 21c6675e32b96719034264b498d11771.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3480 21c6675e32b96719034264b498d11771.exe 2212 21c6675e32b96719034264b498d11771.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3480 wrote to memory of 2212 3480 21c6675e32b96719034264b498d11771.exe 90 PID 3480 wrote to memory of 2212 3480 21c6675e32b96719034264b498d11771.exe 90 PID 3480 wrote to memory of 2212 3480 21c6675e32b96719034264b498d11771.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\21c6675e32b96719034264b498d11771.exe"C:\Users\Admin\AppData\Local\Temp\21c6675e32b96719034264b498d11771.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\21c6675e32b96719034264b498d11771.exeC:\Users\Admin\AppData\Local\Temp\21c6675e32b96719034264b498d11771.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2212
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
461KB
MD5bd0efe81bd3b3e68295d598c2ac41e45
SHA1e46a976ff585cc95cf4660b57b15262c0dba44a4
SHA256294adb7e51d679955c75e526b182864fb6d6fa77db43089c54921adb1146d73b
SHA512a3bee800972c56fc5e8f3f6442cf2a0c12e4a79aa94d9aedc26db9507150ae347abf99483fa6a83ba391bec856faabc9fd3509d9c359b602075ff9a0f5e27fa2