Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 11:07
Behavioral task
behavioral1
Sample
87500514d502dccc66559b8a80c7409d.exe
Resource
win7-20231215-en
General
-
Target
87500514d502dccc66559b8a80c7409d.exe
-
Size
2.3MB
-
MD5
87500514d502dccc66559b8a80c7409d
-
SHA1
46dd63f93997f771bb2008764b23b967edafd10b
-
SHA256
1c414eb33725d3ce98853c6fbacb008249fd14fe89103e07e87aa82981819cbe
-
SHA512
043c6a02eca3f345d6375f0362369d011c09a4d0ae2a7d1f4a6cb981b005a75c1510ca9147f418d7f6dd1b8cbd682f31ba55b250ab99a648bff71592d640f9bd
-
SSDEEP
49152:Uuw/o3WGn72qvCICfPXuxzEKub24mOU3xcys0LDBhQobsTCG:Uu3n71vxCfvGEj24ml3xcybp
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2172-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2172-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1760-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1760-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1760-25-0x0000000003130000-0x00000000032C3000-memory.dmp xmrig behavioral1/memory/1760-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/1760-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2172-36-0x0000000003560000-0x0000000003872000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1760 87500514d502dccc66559b8a80c7409d.exe -
Executes dropped EXE 1 IoCs
pid Process 1760 87500514d502dccc66559b8a80c7409d.exe -
Loads dropped DLL 1 IoCs
pid Process 2172 87500514d502dccc66559b8a80c7409d.exe -
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000a000000012252-10.dat upx behavioral1/memory/2172-14-0x0000000003560000-0x0000000003872000-memory.dmp upx behavioral1/memory/1760-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2172 87500514d502dccc66559b8a80c7409d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2172 87500514d502dccc66559b8a80c7409d.exe 1760 87500514d502dccc66559b8a80c7409d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1760 2172 87500514d502dccc66559b8a80c7409d.exe 29 PID 2172 wrote to memory of 1760 2172 87500514d502dccc66559b8a80c7409d.exe 29 PID 2172 wrote to memory of 1760 2172 87500514d502dccc66559b8a80c7409d.exe 29 PID 2172 wrote to memory of 1760 2172 87500514d502dccc66559b8a80c7409d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\87500514d502dccc66559b8a80c7409d.exe"C:\Users\Admin\AppData\Local\Temp\87500514d502dccc66559b8a80c7409d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\87500514d502dccc66559b8a80c7409d.exeC:\Users\Admin\AppData\Local\Temp\87500514d502dccc66559b8a80c7409d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1760
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5f612e380688b692066b2dd262e6583a8
SHA1808b10b8d904ea8c07ebdd6618f0c7b75a351101
SHA25635214dd3a3e2a06239f8d1083e223a566872619cf1026b2e80867e1f5990304d
SHA51256cc1a693e50d596da2cba11e9fb67efb568b33211c42f9ef469fdcedd4eeece155a5c5221a160f7a1ff51f56d75bb667ae9f3b8adf151f95fb91dc5e0ea3edf