Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 07:42
Behavioral task
behavioral1
Sample
7a7321b341fb8f0fc7e0df45b7b9cd89.exe
Resource
win7-20231215-en
General
-
Target
7a7321b341fb8f0fc7e0df45b7b9cd89.exe
-
Size
784KB
-
MD5
7a7321b341fb8f0fc7e0df45b7b9cd89
-
SHA1
6323eab0a9f4199a2c1b097a3b95c6408183e7f4
-
SHA256
bdcf5fc1f374f2818a1ed41c245c0ddb1452988882e8f0c076f03dedf43fd5a8
-
SHA512
c999f1569bc2301f824d6086eec046bf24b491129da8475d8d7fc1e8ee1b9e65c9d999956df9064ff5c722a226a53305d86cc70b2c210a846f2fff0fc4742021
-
SSDEEP
24576:S868M6Wv89dbdTAXoMI/6CA45Evepv12dc2:SF8M6WvOv84a4uvt+2
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4716-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4716-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2392-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2392-21-0x00000000053C0000-0x0000000005553000-memory.dmp xmrig behavioral2/memory/2392-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2392-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2392 7a7321b341fb8f0fc7e0df45b7b9cd89.exe -
Executes dropped EXE 1 IoCs
pid Process 2392 7a7321b341fb8f0fc7e0df45b7b9cd89.exe -
resource yara_rule behavioral2/memory/4716-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023201-11.dat upx behavioral2/memory/2392-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4716 7a7321b341fb8f0fc7e0df45b7b9cd89.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4716 7a7321b341fb8f0fc7e0df45b7b9cd89.exe 2392 7a7321b341fb8f0fc7e0df45b7b9cd89.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4716 wrote to memory of 2392 4716 7a7321b341fb8f0fc7e0df45b7b9cd89.exe 21 PID 4716 wrote to memory of 2392 4716 7a7321b341fb8f0fc7e0df45b7b9cd89.exe 21 PID 4716 wrote to memory of 2392 4716 7a7321b341fb8f0fc7e0df45b7b9cd89.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a7321b341fb8f0fc7e0df45b7b9cd89.exe"C:\Users\Admin\AppData\Local\Temp\7a7321b341fb8f0fc7e0df45b7b9cd89.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\7a7321b341fb8f0fc7e0df45b7b9cd89.exeC:\Users\Admin\AppData\Local\Temp\7a7321b341fb8f0fc7e0df45b7b9cd89.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2392
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD54ef7e40f13b8dd044a44c6eb950797e0
SHA110fa554f63cf1c35425bc4db888cbebfa9c216f1
SHA2564d86226b39f6c465f094c345881ff8faa40851645d378d47777261ee967b785d
SHA5125b6d7731881518fa04a9e25bedc1a8db4b00300aeb11747b0134dc0a370a7a8457ff246bd58518fdbc2f618f3a7bd057dd354ccf3d638e91bdea4ed8091a1bf4