Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 05:15
Behavioral task
behavioral1
Sample
704809717c645d73dbd00c474b8861f8.exe
Resource
win7-20231215-en
General
-
Target
704809717c645d73dbd00c474b8861f8.exe
-
Size
784KB
-
MD5
704809717c645d73dbd00c474b8861f8
-
SHA1
3c7c353f74ef24aea8743371faa4f7585feb044d
-
SHA256
d5b38b1395d38b71608d166a8784636a1ea2f071da71212db7bb465d318af4b6
-
SHA512
eba575a0a68e5d47b3f88e9fe60c72062317156cb0d7bd9bd61c58b00905ffe28ae6cd4d45195bf6dafb7e9257d861e5b8b0bcaa6d81b1dd030ddbeade9bd71b
-
SSDEEP
12288:BOKkgVQ08APQ8Tbq8HPvEj2DzAGvq5a7xXjiKiqTkKt501AqAmp8QbZht0L2R/R:aGFj7/PvEsxvq5a7xTiKiq4p1AgjB0
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/2628-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2628-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/5088-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/5088-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/5088-21-0x00000000053F0000-0x0000000005583000-memory.dmp xmrig behavioral2/memory/5088-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 5088 704809717c645d73dbd00c474b8861f8.exe -
Executes dropped EXE 1 IoCs
pid Process 5088 704809717c645d73dbd00c474b8861f8.exe -
resource yara_rule behavioral2/memory/2628-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/5088-13-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000c0000000231e7-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2628 704809717c645d73dbd00c474b8861f8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2628 704809717c645d73dbd00c474b8861f8.exe 5088 704809717c645d73dbd00c474b8861f8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2628 wrote to memory of 5088 2628 704809717c645d73dbd00c474b8861f8.exe 91 PID 2628 wrote to memory of 5088 2628 704809717c645d73dbd00c474b8861f8.exe 91 PID 2628 wrote to memory of 5088 2628 704809717c645d73dbd00c474b8861f8.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\704809717c645d73dbd00c474b8861f8.exe"C:\Users\Admin\AppData\Local\Temp\704809717c645d73dbd00c474b8861f8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\704809717c645d73dbd00c474b8861f8.exeC:\Users\Admin\AppData\Local\Temp\704809717c645d73dbd00c474b8861f8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5088
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD565a785accaa3cfa17d2e9aa6071efa5d
SHA18087c46467fb1a8194158b6b25b80d6f41f22281
SHA256e1333c4cae225164bf2e5823417129deb170a6191ee006dd6d9e571563c86c89
SHA512899bd425af5216e1d2e4f4faae80e081a2f269e9a3669287ec3aff9fbf81d58ce882ee6d1576bf72b56e230ade6c1ceae10bc02ffc598569b410d45d2bb3c270