Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 17:12

General

  • Target

    fc4cecef5684ae291bafc481c83a9dce.exe

  • Size

    784KB

  • MD5

    fc4cecef5684ae291bafc481c83a9dce

  • SHA1

    3dbb2d97b86a83d8d49ee08372165a38dd4bd1a3

  • SHA256

    66c676db63026f9ece18a0213d9609febce4d7df5ab1c4b5c1e5b29d37d2cdcd

  • SHA512

    8890bb6d36973668ba901c8514ee8b54de9ec40043b23d74957d19f0656394499167bc4a929f49eccbd24ca3ac603d9b9838546ab625fa908d494181e0aa6dc0

  • SSDEEP

    12288:Ym/qF/fzU9p5mRr5e604eFVcZa69ZKEzkIHrCHFW/iee965MY2GOp7:Ym/W/fSo15e658+9ZnkAWHFXDYta

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 6 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc4cecef5684ae291bafc481c83a9dce.exe
    "C:\Users\Admin\AppData\Local\Temp\fc4cecef5684ae291bafc481c83a9dce.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Users\Admin\AppData\Local\Temp\fc4cecef5684ae291bafc481c83a9dce.exe
      C:\Users\Admin\AppData\Local\Temp\fc4cecef5684ae291bafc481c83a9dce.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2348

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\fc4cecef5684ae291bafc481c83a9dce.exe

          Filesize

          382KB

          MD5

          f6cf2f8b54c2e2f301698b8e07d958b0

          SHA1

          eec58c915f61e68f56efcd7348f87c146b42334a

          SHA256

          ec89b2bf8a19b9b45c71117466be3defcba46254f8a9c105289f1ba3930ccf29

          SHA512

          ee0bdbe18debbf43f4b36d4793706c8fb9ddce499668e0e0ddd0ad58cb666b1303107c3d13444b841b1af57ef6be5159216bf57915f651965df3e0a298c9a2fe

        • memory/2348-13-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB

        • memory/2348-15-0x0000000001A30000-0x0000000001AF4000-memory.dmp

          Filesize

          784KB

        • memory/2348-21-0x0000000000400000-0x0000000000587000-memory.dmp

          Filesize

          1.5MB

        • memory/2348-20-0x0000000005420000-0x00000000055B3000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-30-0x0000000000400000-0x0000000000587000-memory.dmp

          Filesize

          1.5MB

        • memory/2348-14-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB

        • memory/3092-0-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB

        • memory/3092-1-0x00000000019D0000-0x0000000001A94000-memory.dmp

          Filesize

          784KB

        • memory/3092-2-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB

        • memory/3092-12-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB