Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 15:13
Behavioral task
behavioral1
Sample
4bd5b5c257ab99e4c588835966c796da.exe
Resource
win7-20231201-en
General
-
Target
4bd5b5c257ab99e4c588835966c796da.exe
-
Size
3.8MB
-
MD5
4bd5b5c257ab99e4c588835966c796da
-
SHA1
86d4d2bb54f6c51877597fd419f790ae39c5dd77
-
SHA256
cb09051f2488ee5258bf6903c611139dd71ebbf3faa0f0c496770141a3cc7b11
-
SHA512
c0e5212eed1d128e4f630d1fe8333e40ffed09e73c73ec90fb00ed3afb2cb541947f2768efd57f58be99794dd2c41535d703fccb4fdc44ca7ad105fca4c442c8
-
SSDEEP
98304:TlN0RxKeqmrPZ5Ne+1zN2TuIiyXcmjgh:59mr/E+bLyM
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1212-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1212-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3828-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3828-20-0x00000000054F0000-0x0000000005683000-memory.dmp xmrig behavioral2/memory/3828-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3828-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3828 4bd5b5c257ab99e4c588835966c796da.exe -
Executes dropped EXE 1 IoCs
pid Process 3828 4bd5b5c257ab99e4c588835966c796da.exe -
resource yara_rule behavioral2/memory/1212-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023226-11.dat upx behavioral2/memory/3828-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1212 4bd5b5c257ab99e4c588835966c796da.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1212 4bd5b5c257ab99e4c588835966c796da.exe 3828 4bd5b5c257ab99e4c588835966c796da.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1212 wrote to memory of 3828 1212 4bd5b5c257ab99e4c588835966c796da.exe 91 PID 1212 wrote to memory of 3828 1212 4bd5b5c257ab99e4c588835966c796da.exe 91 PID 1212 wrote to memory of 3828 1212 4bd5b5c257ab99e4c588835966c796da.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bd5b5c257ab99e4c588835966c796da.exe"C:\Users\Admin\AppData\Local\Temp\4bd5b5c257ab99e4c588835966c796da.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\4bd5b5c257ab99e4c588835966c796da.exeC:\Users\Admin\AppData\Local\Temp\4bd5b5c257ab99e4c588835966c796da.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3828
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD532eaa7d28176564908711f9c9f595c5d
SHA1eadf98ef5cd367459c2570e2ba3d40a0560f4e77
SHA2562aef0e854cada90bc3ca9739542c82eef99108e06e46049a5c5a498dd8aadbf6
SHA512187d2c5c6e147a1a60231a3c7af3d8e0c4d8d6c857518221c2b7d5cb89998d1cf9ea755c896ed249edd9f451b120a1c774e310d80bdf4af54d3a57420a6c3689