Analysis

  • max time kernel
    122s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 05:15

General

  • Target

    704809717c645d73dbd00c474b8861f8.exe

  • Size

    784KB

  • MD5

    704809717c645d73dbd00c474b8861f8

  • SHA1

    3c7c353f74ef24aea8743371faa4f7585feb044d

  • SHA256

    d5b38b1395d38b71608d166a8784636a1ea2f071da71212db7bb465d318af4b6

  • SHA512

    eba575a0a68e5d47b3f88e9fe60c72062317156cb0d7bd9bd61c58b00905ffe28ae6cd4d45195bf6dafb7e9257d861e5b8b0bcaa6d81b1dd030ddbeade9bd71b

  • SSDEEP

    12288:BOKkgVQ08APQ8Tbq8HPvEj2DzAGvq5a7xXjiKiqTkKt501AqAmp8QbZht0L2R/R:aGFj7/PvEsxvq5a7xTiKiq4p1AgjB0

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 7 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\704809717c645d73dbd00c474b8861f8.exe
    "C:\Users\Admin\AppData\Local\Temp\704809717c645d73dbd00c474b8861f8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Users\Admin\AppData\Local\Temp\704809717c645d73dbd00c474b8861f8.exe
      C:\Users\Admin\AppData\Local\Temp\704809717c645d73dbd00c474b8861f8.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2672

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\704809717c645d73dbd00c474b8861f8.exe

          Filesize

          784KB

          MD5

          7a509e2af2b071607c25390bc60367e2

          SHA1

          83c1247f6a670473170376122ab30c640d7a5e7e

          SHA256

          63236f08aa9cd89b4d8304bd6251be15d42b5576c3bc4900a0b3399cef78fbe9

          SHA512

          cd78390419f9c7caee5496d12a075d9e34a28f1e1cba311f41d871b7e66b0dfc545738e899b314ef9244f9b09bf9a451d6d96621a7f84beee3d44c56e7bb020b

        • memory/2672-17-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB

        • memory/2672-18-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB

        • memory/2672-23-0x0000000001720000-0x00000000017E4000-memory.dmp

          Filesize

          784KB

        • memory/2672-24-0x0000000003060000-0x00000000031F3000-memory.dmp

          Filesize

          1.6MB

        • memory/2672-25-0x0000000000400000-0x0000000000587000-memory.dmp

          Filesize

          1.5MB

        • memory/2672-34-0x00000000005A0000-0x000000000071F000-memory.dmp

          Filesize

          1.5MB

        • memory/2672-35-0x0000000000400000-0x0000000000587000-memory.dmp

          Filesize

          1.5MB

        • memory/2784-2-0x00000000018B0000-0x0000000001974000-memory.dmp

          Filesize

          784KB

        • memory/2784-1-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB

        • memory/2784-14-0x00000000032C0000-0x00000000035D2000-memory.dmp

          Filesize

          3.1MB

        • memory/2784-15-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB

        • memory/2784-0-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB