Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 07:42
Behavioral task
behavioral1
Sample
7a7321b341fb8f0fc7e0df45b7b9cd89.exe
Resource
win7-20231215-en
General
-
Target
7a7321b341fb8f0fc7e0df45b7b9cd89.exe
-
Size
784KB
-
MD5
7a7321b341fb8f0fc7e0df45b7b9cd89
-
SHA1
6323eab0a9f4199a2c1b097a3b95c6408183e7f4
-
SHA256
bdcf5fc1f374f2818a1ed41c245c0ddb1452988882e8f0c076f03dedf43fd5a8
-
SHA512
c999f1569bc2301f824d6086eec046bf24b491129da8475d8d7fc1e8ee1b9e65c9d999956df9064ff5c722a226a53305d86cc70b2c210a846f2fff0fc4742021
-
SSDEEP
24576:S868M6Wv89dbdTAXoMI/6CA45Evepv12dc2:SF8M6WvOv84a4uvt+2
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2336-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2336-15-0x00000000030E0000-0x00000000033F2000-memory.dmp xmrig behavioral1/memory/2336-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2312-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2312-25-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2312-24-0x0000000003220000-0x00000000033B3000-memory.dmp xmrig behavioral1/memory/2312-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2312 7a7321b341fb8f0fc7e0df45b7b9cd89.exe -
Executes dropped EXE 1 IoCs
pid Process 2312 7a7321b341fb8f0fc7e0df45b7b9cd89.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 7a7321b341fb8f0fc7e0df45b7b9cd89.exe -
resource yara_rule behavioral1/memory/2336-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000b000000012185-10.dat upx behavioral1/memory/2312-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2336 7a7321b341fb8f0fc7e0df45b7b9cd89.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2336 7a7321b341fb8f0fc7e0df45b7b9cd89.exe 2312 7a7321b341fb8f0fc7e0df45b7b9cd89.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2312 2336 7a7321b341fb8f0fc7e0df45b7b9cd89.exe 29 PID 2336 wrote to memory of 2312 2336 7a7321b341fb8f0fc7e0df45b7b9cd89.exe 29 PID 2336 wrote to memory of 2312 2336 7a7321b341fb8f0fc7e0df45b7b9cd89.exe 29 PID 2336 wrote to memory of 2312 2336 7a7321b341fb8f0fc7e0df45b7b9cd89.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a7321b341fb8f0fc7e0df45b7b9cd89.exe"C:\Users\Admin\AppData\Local\Temp\7a7321b341fb8f0fc7e0df45b7b9cd89.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\7a7321b341fb8f0fc7e0df45b7b9cd89.exeC:\Users\Admin\AppData\Local\Temp\7a7321b341fb8f0fc7e0df45b7b9cd89.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2312
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD53bd57a27086c983c61d266ae42362251
SHA1829ec4684e3ebddccfe7ae0b008bc662f494ac28
SHA256fb7d8ce1a7e1b89a884458ef10d10e45ad748fe2992030136c05e4ff98f49304
SHA51262bff317f756faad3d7375a9517178bbc896704fd7a7101795420d7c85991c655c4a68d04a925cab2d5ee48af2f36bb82513b09befb68b8f9aa9aa8faaec0621