Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 15:21
Behavioral task
behavioral1
Sample
d874a00badc8d1bb9c6c5040e9326fb9.exe
Resource
win7-20231215-en
General
-
Target
d874a00badc8d1bb9c6c5040e9326fb9.exe
-
Size
784KB
-
MD5
d874a00badc8d1bb9c6c5040e9326fb9
-
SHA1
d2bde9616df147af2cfbdce26e6fefdae15a2f7e
-
SHA256
c2863fccd8ef5744e01046d664be8feead06adeaf9b808f4607ece6a0af91d09
-
SHA512
160b8590c7be5162c9321a4d584f9aedd7f706f14994a3eef160992694b86afefd62168c27920ada64b52247270120373cddf610506da485775e4a0cdff0bd61
-
SSDEEP
24576:hivG0+ITNw8uxp9XgInLwB1sjOXIu1i7B+WqB0JE6AgR:eGKNw8uFXg4wB1hXIPU76
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/3292-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3292-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3748-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3748-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3748-20-0x0000000005300000-0x0000000005493000-memory.dmp xmrig behavioral2/memory/3748-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3748-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3748 d874a00badc8d1bb9c6c5040e9326fb9.exe -
Executes dropped EXE 1 IoCs
pid Process 3748 d874a00badc8d1bb9c6c5040e9326fb9.exe -
resource yara_rule behavioral2/memory/3292-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000600000002320d-11.dat upx behavioral2/memory/3748-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3292 d874a00badc8d1bb9c6c5040e9326fb9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3292 d874a00badc8d1bb9c6c5040e9326fb9.exe 3748 d874a00badc8d1bb9c6c5040e9326fb9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3292 wrote to memory of 3748 3292 d874a00badc8d1bb9c6c5040e9326fb9.exe 34 PID 3292 wrote to memory of 3748 3292 d874a00badc8d1bb9c6c5040e9326fb9.exe 34 PID 3292 wrote to memory of 3748 3292 d874a00badc8d1bb9c6c5040e9326fb9.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d874a00badc8d1bb9c6c5040e9326fb9.exe"C:\Users\Admin\AppData\Local\Temp\d874a00badc8d1bb9c6c5040e9326fb9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\d874a00badc8d1bb9c6c5040e9326fb9.exeC:\Users\Admin\AppData\Local\Temp\d874a00badc8d1bb9c6c5040e9326fb9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3748
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5cac29196719240ed8fcc14bd7fd50f6f
SHA1bd500cdb45f52c5b5bb29a99fc6586b60c7f6b22
SHA2568309546d8fbbeee2218d4c465bd6e28a1782562d19e9418ecb191768eee23caa
SHA5125ffc2241026d2c067d753514b9f7f7abc904e13c24508468379dab502b3c349a4e4e01404de90f0d887d2b8adffb3daba4265189cfc99a8bf71fd62be95badfa