Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:01
Behavioral task
behavioral1
Sample
956121b6401771cef1fdab91f25f1826.exe
Resource
win7-20231215-en
General
-
Target
956121b6401771cef1fdab91f25f1826.exe
-
Size
784KB
-
MD5
956121b6401771cef1fdab91f25f1826
-
SHA1
075ad9e46588592bacba8a8f0aab09b0144caa3a
-
SHA256
d10907b5c289546ef608fd40c22d7ff62aaccedba1ee2b08e8f6dd59ba8aa32c
-
SHA512
f1d31d23884d01669fdeeb3c495c90c0deea7f4da62f58e679878005c17f6154a0effcdf8cf09d521a04393bbd2e1ba495a0e0faa7696732262a9c7191d90db9
-
SSDEEP
12288:sHwBTN3srm5gW9YL+G15868fXABZyWNRESl6kjm47nyZdMUCzg6EkonuDA6yWO/9:sQ4lUYLT38QZDrl6kK47ohCzgEA6Tc
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1304-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1304-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1664-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1664-20-0x00000000053F0000-0x0000000005583000-memory.dmp xmrig behavioral2/memory/1664-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1664-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1664 956121b6401771cef1fdab91f25f1826.exe -
Executes dropped EXE 1 IoCs
pid Process 1664 956121b6401771cef1fdab91f25f1826.exe -
resource yara_rule behavioral2/memory/1304-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0006000000023218-11.dat upx behavioral2/memory/1664-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1304 956121b6401771cef1fdab91f25f1826.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1304 956121b6401771cef1fdab91f25f1826.exe 1664 956121b6401771cef1fdab91f25f1826.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1664 1304 956121b6401771cef1fdab91f25f1826.exe 90 PID 1304 wrote to memory of 1664 1304 956121b6401771cef1fdab91f25f1826.exe 90 PID 1304 wrote to memory of 1664 1304 956121b6401771cef1fdab91f25f1826.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\956121b6401771cef1fdab91f25f1826.exe"C:\Users\Admin\AppData\Local\Temp\956121b6401771cef1fdab91f25f1826.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\956121b6401771cef1fdab91f25f1826.exeC:\Users\Admin\AppData\Local\Temp\956121b6401771cef1fdab91f25f1826.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1664
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD5ea579cef42ecd8b3622583fdae45fbef
SHA14ba99f174663e22208ba52aae8d55e597bdc9047
SHA25615ba03fa09ad4abb4ae0ac11ecb536b374539dd25a4f8cf85a6e3b3b7def0527
SHA512891e154ac6f8de86be943ed10b8b48c0cca8cb076416b63f72f86e3c973202feff4d18cd34c9d56b82c393953d4e734db3de851251c6a916d4b77956a0fa7daf