Analysis
-
max time kernel
144s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 13:52
Behavioral task
behavioral1
Sample
b0235115aa2a9d387cd59d4aab5a26de.exe
Resource
win7-20231129-en
windows7-x64
9 signatures
150 seconds
General
-
Target
b0235115aa2a9d387cd59d4aab5a26de.exe
-
Size
784KB
-
MD5
b0235115aa2a9d387cd59d4aab5a26de
-
SHA1
ecbab0442893f00dedc52307cd7c9d7e58d0ec3c
-
SHA256
0b5c20000603cef198e38652a578fbd34fcdcc3815f45e268a49301e751147c3
-
SHA512
0465e5a827ee8869bb58f3b936de0d8a4c5baddd15a2c0fcd10e65b89e3e8fc0aafa3a4f3a6a1299b239222dfcf2848020ed52fa5abc034c462ab8b4efed15cf
-
SSDEEP
24576:AIV/phjRRrzbLLaXvDc9zvYe1ZVBmXRZV:jVL3rzLaXvo9zvJXVBmBf
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4560-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4468-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4468-22-0x00000000053F0000-0x0000000005583000-memory.dmp xmrig behavioral2/memory/4468-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4468-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4560-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4468 b0235115aa2a9d387cd59d4aab5a26de.exe -
Executes dropped EXE 1 IoCs
pid Process 4468 b0235115aa2a9d387cd59d4aab5a26de.exe -
resource yara_rule behavioral2/memory/4560-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/4468-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4560 b0235115aa2a9d387cd59d4aab5a26de.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4560 b0235115aa2a9d387cd59d4aab5a26de.exe 4468 b0235115aa2a9d387cd59d4aab5a26de.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4560 wrote to memory of 4468 4560 b0235115aa2a9d387cd59d4aab5a26de.exe 20 PID 4560 wrote to memory of 4468 4560 b0235115aa2a9d387cd59d4aab5a26de.exe 20 PID 4560 wrote to memory of 4468 4560 b0235115aa2a9d387cd59d4aab5a26de.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0235115aa2a9d387cd59d4aab5a26de.exe"C:\Users\Admin\AppData\Local\Temp\b0235115aa2a9d387cd59d4aab5a26de.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\b0235115aa2a9d387cd59d4aab5a26de.exeC:\Users\Admin\AppData\Local\Temp\b0235115aa2a9d387cd59d4aab5a26de.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4468
-