Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19/12/2023, 13:54

General

  • Target

    3a5a6d40ef979808b67dd9c3afaa0029.exe

  • Size

    2.3MB

  • MD5

    3a5a6d40ef979808b67dd9c3afaa0029

  • SHA1

    4602a5a23632adc5109a450f5473beb1da4112a5

  • SHA256

    3cfaea0219e049bd7cc3034b2031019c7e46bfe94659b48562fa48ac4d1f044c

  • SHA512

    723b183ebc1a66009b36b8f7790baddf2f17ec37690257d1e092854f5a467e1252dc20e417496bc93ff38320d75f30af7e7a91baf6555678e4ca71452af1b4ef

  • SSDEEP

    49152:asfRSGnMU3xW/QxFmXcivKrt6+dhItfc0dDmHaeOAOVt4ZKZXtaQ98n:awZn5xW/QqMie6+YB7dDmH1OhtHLqn

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 6 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a5a6d40ef979808b67dd9c3afaa0029.exe
    "C:\Users\Admin\AppData\Local\Temp\3a5a6d40ef979808b67dd9c3afaa0029.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Users\Admin\AppData\Local\Temp\3a5a6d40ef979808b67dd9c3afaa0029.exe
      C:\Users\Admin\AppData\Local\Temp\3a5a6d40ef979808b67dd9c3afaa0029.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3a5a6d40ef979808b67dd9c3afaa0029.exe

    Filesize

    246KB

    MD5

    ed3febba5a4a2bca22f8ae145867da68

    SHA1

    95d6d3cbbc2bd74ee5b4017df346e8ca029f2a90

    SHA256

    624e1846fae47160ab6e69023525fd9ade3102b531b83daf6dccc76d2ca821ee

    SHA512

    e0b5e192bfd665ef1297659336741f54fa9521ad0d15d96deecb386d12d8d3d7866f0ffb9481e9e77f00d954024656367c214105be1314f1eab36a4114e56d1f

  • \Users\Admin\AppData\Local\Temp\3a5a6d40ef979808b67dd9c3afaa0029.exe

    Filesize

    538KB

    MD5

    238b5168f751400963a9e38a4743af21

    SHA1

    99a5be5f6535f86906ba47c8eb70067ef209c494

    SHA256

    29175b440a6ef703181d6e077631ad4322e933b2da76782ec4edc4439c84a2f4

    SHA512

    9c50d3fe7b9edc4d96bda890845de1242480aa71e9570ac05fc45b028966fa4219efc5548ec5b264cb32487f7deb32cd109100d0d9436ceef5f7d57d63bd9b57

  • memory/1948-19-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/1948-17-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/1948-18-0x0000000000120000-0x00000000001E4000-memory.dmp

    Filesize

    784KB

  • memory/1948-26-0x0000000003200000-0x0000000003393000-memory.dmp

    Filesize

    1.6MB

  • memory/1948-24-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/1948-34-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/2892-3-0x00000000002C0000-0x0000000000384000-memory.dmp

    Filesize

    784KB

  • memory/2892-1-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2892-15-0x0000000003490000-0x00000000037A2000-memory.dmp

    Filesize

    3.1MB

  • memory/2892-14-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2892-0-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/2892-35-0x0000000003490000-0x00000000037A2000-memory.dmp

    Filesize

    3.1MB