Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 13:24
Behavioral task
behavioral1
Sample
3222c4f012398a191ee3d328386b2534.exe
Resource
win7-20231129-en
General
-
Target
3222c4f012398a191ee3d328386b2534.exe
-
Size
1.5MB
-
MD5
3222c4f012398a191ee3d328386b2534
-
SHA1
c903a2f65458b874c26335f62ba58b69c5874624
-
SHA256
06b38374160b2858a87fd31440321cfedfedf80710495b7f6abe691b588f3a0c
-
SHA512
8b9d8c0f2ff40f70d4db7590bc4ffb19d33fac1e68b15becdc70ad11f702b0660371dc8f8d617610a8ee6776bba1af561470c606cf7ea634701c87c7ee517f30
-
SSDEEP
24576:IGzpUYMAT1mkQGPnsLV9cl7aYAyrqOKdOw4OSQwKcN1QPXphsMMg:JU4ZmkmV9kpAQwbTPcN8Z1
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3640-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3640-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4896-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4896-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4896-23-0x00000000053E0000-0x0000000005573000-memory.dmp xmrig behavioral2/memory/4896-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4896 3222c4f012398a191ee3d328386b2534.exe -
Executes dropped EXE 1 IoCs
pid Process 4896 3222c4f012398a191ee3d328386b2534.exe -
resource yara_rule behavioral2/memory/3640-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000b00000002315f-12.dat upx behavioral2/memory/4896-14-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3640 3222c4f012398a191ee3d328386b2534.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3640 3222c4f012398a191ee3d328386b2534.exe 4896 3222c4f012398a191ee3d328386b2534.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3640 wrote to memory of 4896 3640 3222c4f012398a191ee3d328386b2534.exe 90 PID 3640 wrote to memory of 4896 3640 3222c4f012398a191ee3d328386b2534.exe 90 PID 3640 wrote to memory of 4896 3640 3222c4f012398a191ee3d328386b2534.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3222c4f012398a191ee3d328386b2534.exe"C:\Users\Admin\AppData\Local\Temp\3222c4f012398a191ee3d328386b2534.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\3222c4f012398a191ee3d328386b2534.exeC:\Users\Admin\AppData\Local\Temp\3222c4f012398a191ee3d328386b2534.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4896
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
489KB
MD5b4791fd81b5147b9c8b462f41339daff
SHA10aa6491476288241dad45dd3396fb84d691467e1
SHA256fc21795ba2cec577fd657ac19bcb28a93025f023cbf0da8672fd10f3fd671da7
SHA5126a9107cdbc27c3f008c9767f2b68d00d0dd5cba1ff081d796fce0cd74a91a5d86208b4e3f4018d3dfe5095570ff97f20aad8762a817eda1ff9d76b89f2e11b96