Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 16:55
Behavioral task
behavioral1
Sample
f99b190431ca87bf5736b3e0f8fcda49.exe
Resource
win7-20231215-en
General
-
Target
f99b190431ca87bf5736b3e0f8fcda49.exe
-
Size
784KB
-
MD5
f99b190431ca87bf5736b3e0f8fcda49
-
SHA1
f6389795b7d078f33f8e1c9439837a8795ae9b60
-
SHA256
9c1f0efd5f60c64c81983c8767211b29db775042f4d318d5f05deb88e36a7031
-
SHA512
634d2f4b815869e143b585746b23ee162d3c4fd0f1c0edd51c3180460cfe0a7a5aacb66275c787fc509d46139c03ef5145fcaaa61de1e8812035d5566e781045
-
SSDEEP
12288:oMBorBm/zmBfocJRuRdYuHT+QSEuWVkaNZHFonTmxCLUmyIPAWhdlFUecuTu2tdh:Byrw/qpPEuskQzmt3yVu7tAE
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/4488-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4488-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3256-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3256-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3256-22-0x0000000005310000-0x00000000054A3000-memory.dmp xmrig behavioral2/memory/3256-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3256-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3256 f99b190431ca87bf5736b3e0f8fcda49.exe -
Executes dropped EXE 1 IoCs
pid Process 3256 f99b190431ca87bf5736b3e0f8fcda49.exe -
resource yara_rule behavioral2/memory/4488-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/3256-13-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000700000002304b-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4488 f99b190431ca87bf5736b3e0f8fcda49.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4488 f99b190431ca87bf5736b3e0f8fcda49.exe 3256 f99b190431ca87bf5736b3e0f8fcda49.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4488 wrote to memory of 3256 4488 f99b190431ca87bf5736b3e0f8fcda49.exe 93 PID 4488 wrote to memory of 3256 4488 f99b190431ca87bf5736b3e0f8fcda49.exe 93 PID 4488 wrote to memory of 3256 4488 f99b190431ca87bf5736b3e0f8fcda49.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99b190431ca87bf5736b3e0f8fcda49.exe"C:\Users\Admin\AppData\Local\Temp\f99b190431ca87bf5736b3e0f8fcda49.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\f99b190431ca87bf5736b3e0f8fcda49.exeC:\Users\Admin\AppData\Local\Temp\f99b190431ca87bf5736b3e0f8fcda49.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3256
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5d004c27a865004abefc74bb41233c2ca
SHA1887769ec9e58b102be87f53c06fc1ac386191205
SHA2560d88b09e96a8e61d6a7b74f5b120b652cdaabc0332873d9203c194b8927decd4
SHA512d54e322a297f949987a8154b074e1a425a94275c935e0cfe0560bbe8fd83a6b285b14de1b7503308f6b644022c0c2f773e670200b865581c6142d420d54c2dbf