Analysis
-
max time kernel
139s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 16:10
Behavioral task
behavioral1
Sample
ea62b72024ee0e2022052adc921e04d1.exe
Resource
win7-20231215-en
General
-
Target
ea62b72024ee0e2022052adc921e04d1.exe
-
Size
784KB
-
MD5
ea62b72024ee0e2022052adc921e04d1
-
SHA1
692808145544f0f93100c96847c627968565482e
-
SHA256
b8a073f84c98286d476318ea10703d968de31d562eede622c71e9e7abeaa467d
-
SHA512
4ca583a719f0efce0a3e25f111b1a767bcc1e46467c97961ada0e41f163a8055b9045829cbc5061c6f6fa548fae598e746c39eb3dc03d8b3049105255ffc0c9d
-
SSDEEP
24576:bqaGzsRvlGrtyPwFhwkwmxPmy7GgkWHw5XM:bM/rqwFhwkwmxPmU7kWO
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4836-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4836-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4152-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4152-20-0x0000000005430000-0x00000000055C3000-memory.dmp xmrig behavioral2/memory/4152-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4152-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4152 ea62b72024ee0e2022052adc921e04d1.exe -
Executes dropped EXE 1 IoCs
pid Process 4152 ea62b72024ee0e2022052adc921e04d1.exe -
resource yara_rule behavioral2/memory/4836-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000700000002320a-11.dat upx behavioral2/memory/4152-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4836 ea62b72024ee0e2022052adc921e04d1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4836 ea62b72024ee0e2022052adc921e04d1.exe 4152 ea62b72024ee0e2022052adc921e04d1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4152 4836 ea62b72024ee0e2022052adc921e04d1.exe 91 PID 4836 wrote to memory of 4152 4836 ea62b72024ee0e2022052adc921e04d1.exe 91 PID 4836 wrote to memory of 4152 4836 ea62b72024ee0e2022052adc921e04d1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea62b72024ee0e2022052adc921e04d1.exe"C:\Users\Admin\AppData\Local\Temp\ea62b72024ee0e2022052adc921e04d1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\ea62b72024ee0e2022052adc921e04d1.exeC:\Users\Admin\AppData\Local\Temp\ea62b72024ee0e2022052adc921e04d1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4152
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD55e850632b8caf84cc4c82ae2c1c52e66
SHA1177cf1a9d90f40de2371a88dddf004724f523957
SHA25656b0521cb2e15a9bb50096f44d7d9ac939d7a0c28039c2bf2311c819e0685363
SHA512ef60aa7a9d70ce27f550cea4e678bf7d3f53869dcc89fd0931bafdb2cda0aa2c99581fd7af72ed6fb7533b211aaff93dbf91d8bfd26f084a28557179e5ddcdc0