Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:17
Behavioral task
behavioral1
Sample
9deafa398c65444f6722f8ee31892835.exe
Resource
win7-20231215-en
General
-
Target
9deafa398c65444f6722f8ee31892835.exe
-
Size
784KB
-
MD5
9deafa398c65444f6722f8ee31892835
-
SHA1
581efa78a9a4e221278af3940bb11e1c1d1742d3
-
SHA256
ff19b0c30d53ebebb7b26fcf07857811bb85c8c433966193e4d9472f9cf28cdf
-
SHA512
149b584d2b9984796753308b9f71dd65566e2e9bfbb2510a50076b7037e28396f1b67aba47d27db53ded8e5bbce6b0ff3c8a787f8f01d327229a034d82127216
-
SSDEEP
24576:rDVEgUZ+U7gLLgFok1trjfGhv2yV1cJfJo:rDYZ+U8Lqok11jehvIJfJo
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/2276-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2276-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2072-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2072-20-0x0000000005400000-0x0000000005593000-memory.dmp xmrig behavioral2/memory/2072-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2072-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2072 9deafa398c65444f6722f8ee31892835.exe -
Executes dropped EXE 1 IoCs
pid Process 2072 9deafa398c65444f6722f8ee31892835.exe -
resource yara_rule behavioral2/memory/2276-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000600000002324d-11.dat upx behavioral2/memory/2072-12-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2276 9deafa398c65444f6722f8ee31892835.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2276 9deafa398c65444f6722f8ee31892835.exe 2072 9deafa398c65444f6722f8ee31892835.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2072 2276 9deafa398c65444f6722f8ee31892835.exe 90 PID 2276 wrote to memory of 2072 2276 9deafa398c65444f6722f8ee31892835.exe 90 PID 2276 wrote to memory of 2072 2276 9deafa398c65444f6722f8ee31892835.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\9deafa398c65444f6722f8ee31892835.exe"C:\Users\Admin\AppData\Local\Temp\9deafa398c65444f6722f8ee31892835.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\9deafa398c65444f6722f8ee31892835.exeC:\Users\Admin\AppData\Local\Temp\9deafa398c65444f6722f8ee31892835.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2072
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5f4b6e049bc05c5ede044c1c78b9c645c
SHA142318086acd4789b79de5074a4c00476099f1c77
SHA2565d1e4bfe784332943315d147dd8bda51681b8ddad655f64e66d93efcade37940
SHA51268d930ff2f38bff1d389bac35db194b90b6f8f24640fe390269eda2384cbdef14eacae3299057eb33488b03115c99cc29073f9f60234069b229bec055a526bb0