Analysis
-
max time kernel
92s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 13:18
Behavioral task
behavioral1
Sample
3081318715a1b92b2e3ef4bbee6dd21b.exe
Resource
win7-20231201-en
General
-
Target
3081318715a1b92b2e3ef4bbee6dd21b.exe
-
Size
784KB
-
MD5
3081318715a1b92b2e3ef4bbee6dd21b
-
SHA1
dcf6b0f97c8a9912d18d03ff72cc37f50b2a315a
-
SHA256
0fdb3a6f0d16d158ee1b440c32dcfa5d2a0b4c5334593041513af74140cae167
-
SHA512
eb73b6fdc2fe0d2628f6468b23530be3563a1749a85bf4c6d1a5925bec2c8b9e1336d679dfb8389cd8d2311aa194137aa0061177508fca5ff1b58d0b8b480e95
-
SSDEEP
24576:irnlxnqjiosIKK6cv7grMelkS/l6iM9mPS2oJvW:irrqO1I+q8QeJ6jmKdJvW
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1664-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1664-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2584-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2584-21-0x00000000053D0000-0x0000000005563000-memory.dmp xmrig behavioral2/memory/2584-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2584-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2584 3081318715a1b92b2e3ef4bbee6dd21b.exe -
Executes dropped EXE 1 IoCs
pid Process 2584 3081318715a1b92b2e3ef4bbee6dd21b.exe -
resource yara_rule behavioral2/memory/1664-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023039-11.dat upx behavioral2/memory/2584-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1664 3081318715a1b92b2e3ef4bbee6dd21b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1664 3081318715a1b92b2e3ef4bbee6dd21b.exe 2584 3081318715a1b92b2e3ef4bbee6dd21b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2584 1664 3081318715a1b92b2e3ef4bbee6dd21b.exe 91 PID 1664 wrote to memory of 2584 1664 3081318715a1b92b2e3ef4bbee6dd21b.exe 91 PID 1664 wrote to memory of 2584 1664 3081318715a1b92b2e3ef4bbee6dd21b.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3081318715a1b92b2e3ef4bbee6dd21b.exe"C:\Users\Admin\AppData\Local\Temp\3081318715a1b92b2e3ef4bbee6dd21b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\3081318715a1b92b2e3ef4bbee6dd21b.exeC:\Users\Admin\AppData\Local\Temp\3081318715a1b92b2e3ef4bbee6dd21b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2584
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5a0dc83d981d88df2b4bc0688c0717deb
SHA1c4d22a043debd1feebecc0d34ffd976e7a3faaee
SHA256f3c34fe24cf87a7d1974de4bd9230006f207fa05700a7f3e8635374b8fcd5d39
SHA512eaa4921d28875b9ba62a2a7176729b777131310565fe7e0dfaea0252b5611c87b78a48773e6360e8bb61fb18d5d08ffadbd750ba835fd7ead6ccc180f54150fb