Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 16:19
Behavioral task
behavioral1
Sample
ecc809b64f999fa1c07f994a4e439a6b.exe
Resource
win7-20231215-en
General
-
Target
ecc809b64f999fa1c07f994a4e439a6b.exe
-
Size
784KB
-
MD5
ecc809b64f999fa1c07f994a4e439a6b
-
SHA1
ac740e0d831e8b7cb61ecc53b1127d88a4da43e0
-
SHA256
80f16937166a83248df7d60f6c19913b628cbecd866756aa15307e9f71659499
-
SHA512
abe06767539c9c71165e408b7f1b843d47a963da07420688165d857e7937eafb9ee45f347cf0f91a2da1bc3a25fc2b170dc52d9fe121d69865a3ab1f7ec749b0
-
SSDEEP
12288:JavmIgVVVDcwI51M49ZJZlZ9w4T+V5Pz1uXrY2npcnL8Z12dac36T+U:TVVN+ZJLZSg+Tr8Y2+L8ZSap+U
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/2308-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2308-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3096-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3096-21-0x0000000005550000-0x00000000056E3000-memory.dmp xmrig behavioral2/memory/3096-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3096-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3096 ecc809b64f999fa1c07f994a4e439a6b.exe -
Executes dropped EXE 1 IoCs
pid Process 3096 ecc809b64f999fa1c07f994a4e439a6b.exe -
resource yara_rule behavioral2/memory/2308-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000200000001fafe-11.dat upx behavioral2/memory/3096-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2308 ecc809b64f999fa1c07f994a4e439a6b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2308 ecc809b64f999fa1c07f994a4e439a6b.exe 3096 ecc809b64f999fa1c07f994a4e439a6b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2308 wrote to memory of 3096 2308 ecc809b64f999fa1c07f994a4e439a6b.exe 32 PID 2308 wrote to memory of 3096 2308 ecc809b64f999fa1c07f994a4e439a6b.exe 32 PID 2308 wrote to memory of 3096 2308 ecc809b64f999fa1c07f994a4e439a6b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecc809b64f999fa1c07f994a4e439a6b.exe"C:\Users\Admin\AppData\Local\Temp\ecc809b64f999fa1c07f994a4e439a6b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\ecc809b64f999fa1c07f994a4e439a6b.exeC:\Users\Admin\AppData\Local\Temp\ecc809b64f999fa1c07f994a4e439a6b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3096
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD5a73566d847acf52e02770f6aad314882
SHA184184a0f9cb6f9b9da63c2a46e7aaa26d84e64e4
SHA256226ebc52e6fc965c94de4b529f47031c2e977c90ccdcc78295d6f26895dadc14
SHA51259073700bd457498fd2a624226de6cb159bb1b83dc496d01aa123273b1e6840d52e284a6ca637e03b503fffaafcb88c9410d22e53af4934f8c17fb9c1f49b6bd