Analysis
-
max time kernel
143s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 15:43
Behavioral task
behavioral1
Sample
de8015cb70b3905f844de2eb5862c88f.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
de8015cb70b3905f844de2eb5862c88f.exe
-
Size
1.5MB
-
MD5
de8015cb70b3905f844de2eb5862c88f
-
SHA1
30303b55752740ba0936fa3ee19f839281ef2d89
-
SHA256
e50dad3efb07f35eeedab3687a06c9180de5dc1ee51a6bc08d5dc9a21ad518f1
-
SHA512
0019f16c772e85335b70917af1382135aee38074d66057ddf7f3661e7cc3d5385637a47a56d762b6583d52c99baf0a45d2f3cfb7aeb30ece6a4aaa62c0340523
-
SSDEEP
24576:SNLdIQNrQJpX2Z88SBiS2nIOmgVd3O9CvpeD/Hw44e9xPkri:SNLdfQ/X2mMSv9w+9CRe7QteXG
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3344-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3344-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3268-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3268-21-0x00000000053A0000-0x0000000005533000-memory.dmp xmrig behavioral2/memory/3268-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3268-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3268 de8015cb70b3905f844de2eb5862c88f.exe -
Executes dropped EXE 1 IoCs
pid Process 3268 de8015cb70b3905f844de2eb5862c88f.exe -
resource yara_rule behavioral2/memory/3344-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/3268-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3344 de8015cb70b3905f844de2eb5862c88f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3344 de8015cb70b3905f844de2eb5862c88f.exe 3268 de8015cb70b3905f844de2eb5862c88f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 3268 3344 de8015cb70b3905f844de2eb5862c88f.exe 92 PID 3344 wrote to memory of 3268 3344 de8015cb70b3905f844de2eb5862c88f.exe 92 PID 3344 wrote to memory of 3268 3344 de8015cb70b3905f844de2eb5862c88f.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\de8015cb70b3905f844de2eb5862c88f.exe"C:\Users\Admin\AppData\Local\Temp\de8015cb70b3905f844de2eb5862c88f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\de8015cb70b3905f844de2eb5862c88f.exeC:\Users\Admin\AppData\Local\Temp\de8015cb70b3905f844de2eb5862c88f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3268
-