Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 16:24
Behavioral task
behavioral1
Sample
ee49ec8d536af2cd14a5ac80543b3d44.exe
Resource
win7-20231129-en
windows7-x64
9 signatures
150 seconds
General
-
Target
ee49ec8d536af2cd14a5ac80543b3d44.exe
-
Size
784KB
-
MD5
ee49ec8d536af2cd14a5ac80543b3d44
-
SHA1
626bb1f0c6fc29ccdfb3e16d6e6aa00d0111c051
-
SHA256
7da4edfa4ddd790670519141b490791fc1ffb1ab75696ef5cfc87d6c3b64b5b7
-
SHA512
38d958511a5803b50172c5d41e7fbeb6d92044ee651b6890b9b5ede9e88e62a5361edb0bf9d2ad91ea3cb23a847c4c9c06861e2e79fa87a7e56bdf45a99abcfd
-
SSDEEP
12288:dyoc80Q6qZdh7VXJjM1f72/CSX+RzSvlJL0YODDHvUcW9Zpx/YgIr:dO856q/XmFw5JQY+DLQDFR
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3700-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3700-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3828-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3828-21-0x0000000005480000-0x0000000005613000-memory.dmp xmrig behavioral2/memory/3828-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3828-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3828 ee49ec8d536af2cd14a5ac80543b3d44.exe -
Executes dropped EXE 1 IoCs
pid Process 3828 ee49ec8d536af2cd14a5ac80543b3d44.exe -
resource yara_rule behavioral2/memory/3700-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/3828-13-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000600000002322e-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3700 ee49ec8d536af2cd14a5ac80543b3d44.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3700 ee49ec8d536af2cd14a5ac80543b3d44.exe 3828 ee49ec8d536af2cd14a5ac80543b3d44.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3700 wrote to memory of 3828 3700 ee49ec8d536af2cd14a5ac80543b3d44.exe 91 PID 3700 wrote to memory of 3828 3700 ee49ec8d536af2cd14a5ac80543b3d44.exe 91 PID 3700 wrote to memory of 3828 3700 ee49ec8d536af2cd14a5ac80543b3d44.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee49ec8d536af2cd14a5ac80543b3d44.exe"C:\Users\Admin\AppData\Local\Temp\ee49ec8d536af2cd14a5ac80543b3d44.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\ee49ec8d536af2cd14a5ac80543b3d44.exeC:\Users\Admin\AppData\Local\Temp\ee49ec8d536af2cd14a5ac80543b3d44.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3828
-