Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:17
Behavioral task
behavioral1
Sample
9deafa398c65444f6722f8ee31892835.exe
Resource
win7-20231215-en
General
-
Target
9deafa398c65444f6722f8ee31892835.exe
-
Size
784KB
-
MD5
9deafa398c65444f6722f8ee31892835
-
SHA1
581efa78a9a4e221278af3940bb11e1c1d1742d3
-
SHA256
ff19b0c30d53ebebb7b26fcf07857811bb85c8c433966193e4d9472f9cf28cdf
-
SHA512
149b584d2b9984796753308b9f71dd65566e2e9bfbb2510a50076b7037e28396f1b67aba47d27db53ded8e5bbce6b0ff3c8a787f8f01d327229a034d82127216
-
SSDEEP
24576:rDVEgUZ+U7gLLgFok1trjfGhv2yV1cJfJo:rDYZ+U8Lqok11jehvIJfJo
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/2324-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2672-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2672-19-0x0000000000400000-0x0000000000712000-memory.dmp xmrig behavioral1/memory/2672-27-0x00000000030E0000-0x0000000003273000-memory.dmp xmrig behavioral1/memory/2672-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2672-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2672-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2324-16-0x00000000031E0000-0x00000000034F2000-memory.dmp xmrig behavioral1/memory/2324-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2672 9deafa398c65444f6722f8ee31892835.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 9deafa398c65444f6722f8ee31892835.exe -
Loads dropped DLL 1 IoCs
pid Process 2324 9deafa398c65444f6722f8ee31892835.exe -
resource yara_rule behavioral1/memory/2324-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000d000000012251-10.dat upx behavioral1/files/0x000d000000012251-14.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2324 9deafa398c65444f6722f8ee31892835.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2324 9deafa398c65444f6722f8ee31892835.exe 2672 9deafa398c65444f6722f8ee31892835.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2672 2324 9deafa398c65444f6722f8ee31892835.exe 29 PID 2324 wrote to memory of 2672 2324 9deafa398c65444f6722f8ee31892835.exe 29 PID 2324 wrote to memory of 2672 2324 9deafa398c65444f6722f8ee31892835.exe 29 PID 2324 wrote to memory of 2672 2324 9deafa398c65444f6722f8ee31892835.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9deafa398c65444f6722f8ee31892835.exe"C:\Users\Admin\AppData\Local\Temp\9deafa398c65444f6722f8ee31892835.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\9deafa398c65444f6722f8ee31892835.exeC:\Users\Admin\AppData\Local\Temp\9deafa398c65444f6722f8ee31892835.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2672
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5c6c0d896d8facba88ae6eafebc95cb92
SHA160c2256e758221af5e8adbfeb34a8adf7ae24ab2
SHA2566b036f38e16c044729452957e09bb5b29f9e33a1eaf9a4457b71ec2b0d684574
SHA5125d8eeee254227089a3f9faae7502d6109bbf1a06420fb5d11e242c1c7aa9f11680ab59ee4acd1b1fc62a0af7359d70e3987da0af52eaf721e0a47c3f2432da62
-
Filesize
577KB
MD505589ef76c581787883cd0955a354246
SHA11eed704bdc1ca7227fcdfec8bb8c483556136830
SHA2560cedc54387a77c484c640f99f458142d0d10da3e54ee12cbe30fd2471685fea1
SHA5124db44978480507ed3baf388406643b8fd8951542c1811fe8e618adb056f04cc247d4dcac77964973ddcdfbd6ce40086b9766df93a1a8437e3b0f664b6766a80a