Analysis
-
max time kernel
46s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 14:31
Behavioral task
behavioral1
Sample
75c59b11f7a166bb4e20023a621b4bac.exe
Resource
win7-20231129-en
General
-
Target
75c59b11f7a166bb4e20023a621b4bac.exe
-
Size
1.3MB
-
MD5
75c59b11f7a166bb4e20023a621b4bac
-
SHA1
f568b4deb151131bcc38f9e759505d7511a0941e
-
SHA256
ac8464357a272c7c31a9c02f7e104eab60a95c95c28a7a0bbb32ffde434a7ec8
-
SHA512
0019807e329d1f0631b68979e3a07e2ca28188dcdd7a1c229f92812715b4b7805b2f5f9964c257d4779844c54fc93e70245c59069424888463993d4c4907b4ab
-
SSDEEP
24576:RVIl/WDGCi7/qkat6Q5aILMCfmARvKYYwdy2VlmNCQgIT0rKiwnotfohd:ROdWCCi7/raZ5aIwC+Ax4ErWThi7JId
Malware Config
Signatures
-
XMRig Miner payload 37 IoCs
resource yara_rule behavioral1/memory/3028-184-0x000000013FC40000-0x000000013FF91000-memory.dmp xmrig behavioral1/memory/2348-213-0x000000013FD90000-0x00000001400E1000-memory.dmp xmrig behavioral1/memory/2068-214-0x000000013F1D0000-0x000000013F521000-memory.dmp xmrig behavioral1/memory/2672-215-0x000000013FFF0000-0x0000000140341000-memory.dmp xmrig behavioral1/memory/2320-216-0x000000013F330000-0x000000013F681000-memory.dmp xmrig behavioral1/memory/2360-217-0x000000013FC10000-0x000000013FF61000-memory.dmp xmrig behavioral1/memory/2572-240-0x000000013FE00000-0x0000000140151000-memory.dmp xmrig behavioral1/memory/2500-294-0x000000013FF80000-0x00000001402D1000-memory.dmp xmrig behavioral1/memory/3052-421-0x000000013F3E0000-0x000000013F731000-memory.dmp xmrig behavioral1/memory/780-423-0x000000013FD60000-0x00000001400B1000-memory.dmp xmrig behavioral1/memory/2852-424-0x000000013F340000-0x000000013F691000-memory.dmp xmrig behavioral1/memory/2176-425-0x000000013F1A0000-0x000000013F4F1000-memory.dmp xmrig behavioral1/memory/2620-426-0x000000013F2F0000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2532-428-0x000000013FC20000-0x000000013FF71000-memory.dmp xmrig behavioral1/memory/2456-427-0x000000013F5D0000-0x000000013F921000-memory.dmp xmrig behavioral1/memory/2800-431-0x000000013FB30000-0x000000013FE81000-memory.dmp xmrig behavioral1/memory/3036-433-0x000000013FC70000-0x000000013FFC1000-memory.dmp xmrig behavioral1/memory/2476-422-0x000000013F5E0000-0x000000013F931000-memory.dmp xmrig behavioral1/memory/2652-420-0x000000013F6F0000-0x000000013FA41000-memory.dmp xmrig behavioral1/memory/2604-383-0x000000013F850000-0x000000013FBA1000-memory.dmp xmrig behavioral1/memory/584-628-0x000000013F890000-0x000000013FBE1000-memory.dmp xmrig behavioral1/memory/2440-629-0x000000013F910000-0x000000013FC61000-memory.dmp xmrig behavioral1/memory/272-636-0x000000013FF30000-0x0000000140281000-memory.dmp xmrig behavioral1/memory/2992-635-0x000000013F040000-0x000000013F391000-memory.dmp xmrig behavioral1/memory/824-640-0x000000013FEB0000-0x0000000140201000-memory.dmp xmrig behavioral1/memory/2632-643-0x000000013FF70000-0x00000001402C1000-memory.dmp xmrig behavioral1/memory/1160-644-0x000000013FD40000-0x0000000140091000-memory.dmp xmrig behavioral1/memory/2288-642-0x000000013FC20000-0x000000013FF71000-memory.dmp xmrig behavioral1/memory/3656-646-0x000000013FB80000-0x000000013FED1000-memory.dmp xmrig behavioral1/memory/2348-653-0x000000013FD90000-0x00000001400E1000-memory.dmp xmrig behavioral1/memory/2828-652-0x000000013FF10000-0x0000000140261000-memory.dmp xmrig behavioral1/memory/2160-650-0x000000013FAF0000-0x000000013FE41000-memory.dmp xmrig behavioral1/memory/2304-641-0x000000013F5A0000-0x000000013F8F1000-memory.dmp xmrig behavioral1/memory/1424-633-0x000000013FDE0000-0x0000000140131000-memory.dmp xmrig behavioral1/memory/2680-632-0x000000013F450000-0x000000013F7A1000-memory.dmp xmrig behavioral1/memory/2252-630-0x000000013F700000-0x000000013FA51000-memory.dmp xmrig behavioral1/memory/2360-546-0x000000013FC10000-0x000000013FF61000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/1668-0-0x000000013F490000-0x000000013F7E1000-memory.dmp upx behavioral1/files/0x0009000000014a5b-3.dat upx behavioral1/memory/3028-184-0x000000013FC40000-0x000000013FF91000-memory.dmp upx behavioral1/memory/2348-213-0x000000013FD90000-0x00000001400E1000-memory.dmp upx behavioral1/memory/2068-214-0x000000013F1D0000-0x000000013F521000-memory.dmp upx behavioral1/memory/2672-215-0x000000013FFF0000-0x0000000140341000-memory.dmp upx behavioral1/memory/2320-216-0x000000013F330000-0x000000013F681000-memory.dmp upx behavioral1/memory/2360-217-0x000000013FC10000-0x000000013FF61000-memory.dmp upx behavioral1/memory/2572-240-0x000000013FE00000-0x0000000140151000-memory.dmp upx behavioral1/memory/2500-294-0x000000013FF80000-0x00000001402D1000-memory.dmp upx behavioral1/memory/3052-421-0x000000013F3E0000-0x000000013F731000-memory.dmp upx behavioral1/memory/780-423-0x000000013FD60000-0x00000001400B1000-memory.dmp upx behavioral1/memory/2852-424-0x000000013F340000-0x000000013F691000-memory.dmp upx behavioral1/memory/2176-425-0x000000013F1A0000-0x000000013F4F1000-memory.dmp upx behavioral1/memory/2620-426-0x000000013F2F0000-0x000000013F641000-memory.dmp upx behavioral1/memory/2532-428-0x000000013FC20000-0x000000013FF71000-memory.dmp upx behavioral1/memory/2456-427-0x000000013F5D0000-0x000000013F921000-memory.dmp upx behavioral1/memory/2800-431-0x000000013FB30000-0x000000013FE81000-memory.dmp upx behavioral1/memory/3036-433-0x000000013FC70000-0x000000013FFC1000-memory.dmp upx behavioral1/memory/2476-422-0x000000013F5E0000-0x000000013F931000-memory.dmp upx behavioral1/memory/2652-420-0x000000013F6F0000-0x000000013FA41000-memory.dmp upx behavioral1/memory/2604-383-0x000000013F850000-0x000000013FBA1000-memory.dmp upx behavioral1/memory/584-628-0x000000013F890000-0x000000013FBE1000-memory.dmp upx behavioral1/memory/2440-629-0x000000013F910000-0x000000013FC61000-memory.dmp upx behavioral1/memory/272-636-0x000000013FF30000-0x0000000140281000-memory.dmp upx behavioral1/memory/2992-635-0x000000013F040000-0x000000013F391000-memory.dmp upx behavioral1/memory/824-640-0x000000013FEB0000-0x0000000140201000-memory.dmp upx behavioral1/memory/2632-643-0x000000013FF70000-0x00000001402C1000-memory.dmp upx behavioral1/memory/1160-644-0x000000013FD40000-0x0000000140091000-memory.dmp upx behavioral1/memory/2288-642-0x000000013FC20000-0x000000013FF71000-memory.dmp upx behavioral1/memory/3656-646-0x000000013FB80000-0x000000013FED1000-memory.dmp upx behavioral1/memory/2348-653-0x000000013FD90000-0x00000001400E1000-memory.dmp upx behavioral1/memory/2828-652-0x000000013FF10000-0x0000000140261000-memory.dmp upx behavioral1/memory/2160-650-0x000000013FAF0000-0x000000013FE41000-memory.dmp upx behavioral1/memory/2304-641-0x000000013F5A0000-0x000000013F8F1000-memory.dmp upx behavioral1/memory/1424-633-0x000000013FDE0000-0x0000000140131000-memory.dmp upx behavioral1/memory/2680-632-0x000000013F450000-0x000000013F7A1000-memory.dmp upx behavioral1/memory/2252-630-0x000000013F700000-0x000000013FA51000-memory.dmp upx behavioral1/memory/2360-546-0x000000013FC10000-0x000000013FF61000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\System\bjoyxvM.exe 75c59b11f7a166bb4e20023a621b4bac.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75c59b11f7a166bb4e20023a621b4bac.exe"C:\Users\Admin\AppData\Local\Temp\75c59b11f7a166bb4e20023a621b4bac.exe"1⤵
- Drops file in Windows directory
PID:1668 -
C:\Windows\System\bjoyxvM.exeC:\Windows\System\bjoyxvM.exe2⤵PID:1752
-
-
C:\Windows\System\UjuGCtB.exeC:\Windows\System\UjuGCtB.exe2⤵PID:2320
-
-
C:\Windows\System\gsGuWzf.exeC:\Windows\System\gsGuWzf.exe2⤵PID:2680
-
-
C:\Windows\System\IMzoCtw.exeC:\Windows\System\IMzoCtw.exe2⤵PID:2276
-
-
C:\Windows\System\PPKINdR.exeC:\Windows\System\PPKINdR.exe2⤵PID:1536
-
-
C:\Windows\System\QSBmqDa.exeC:\Windows\System\QSBmqDa.exe2⤵PID:272
-
-
C:\Windows\System\lgZLaXA.exeC:\Windows\System\lgZLaXA.exe2⤵PID:2560
-
-
C:\Windows\System\xFnhJyD.exeC:\Windows\System\xFnhJyD.exe2⤵PID:3192
-
-
C:\Windows\System\BWDUfEg.exeC:\Windows\System\BWDUfEg.exe2⤵PID:3424
-
-
C:\Windows\System\kasbOyK.exeC:\Windows\System\kasbOyK.exe2⤵PID:3588
-
-
C:\Windows\System\nZnEZSj.exeC:\Windows\System\nZnEZSj.exe2⤵PID:3656
-
-
C:\Windows\System\tdWqSAD.exeC:\Windows\System\tdWqSAD.exe2⤵PID:3640
-
-
C:\Windows\System\UckRBkC.exeC:\Windows\System\UckRBkC.exe2⤵PID:3624
-
-
C:\Windows\System\SjgCanI.exeC:\Windows\System\SjgCanI.exe2⤵PID:3572
-
-
C:\Windows\System\AoKFcQc.exeC:\Windows\System\AoKFcQc.exe2⤵PID:3556
-
-
C:\Windows\System\pGLZclS.exeC:\Windows\System\pGLZclS.exe2⤵PID:3732
-
-
C:\Windows\System\qhpVzPK.exeC:\Windows\System\qhpVzPK.exe2⤵PID:3540
-
-
C:\Windows\System\pionYjE.exeC:\Windows\System\pionYjE.exe2⤵PID:3524
-
-
C:\Windows\System\RQIxKGl.exeC:\Windows\System\RQIxKGl.exe2⤵PID:3508
-
-
C:\Windows\System\KRqyzFy.exeC:\Windows\System\KRqyzFy.exe2⤵PID:3492
-
-
C:\Windows\System\QdowltN.exeC:\Windows\System\QdowltN.exe2⤵PID:3476
-
-
C:\Windows\System\TeZhuWB.exeC:\Windows\System\TeZhuWB.exe2⤵PID:3760
-
-
C:\Windows\System\cWkhqaX.exeC:\Windows\System\cWkhqaX.exe2⤵PID:3176
-
-
C:\Windows\System\yetqPxf.exeC:\Windows\System\yetqPxf.exe2⤵PID:3160
-
-
C:\Windows\System\QlFmwOE.exeC:\Windows\System\QlFmwOE.exe2⤵PID:3144
-
-
C:\Windows\System\ycwQfXi.exeC:\Windows\System\ycwQfXi.exe2⤵PID:3128
-
-
C:\Windows\System\YtKgprj.exeC:\Windows\System\YtKgprj.exe2⤵PID:3784
-
-
C:\Windows\System\dCjiLTw.exeC:\Windows\System\dCjiLTw.exe2⤵PID:3112
-
-
C:\Windows\System\XSFsvnj.exeC:\Windows\System\XSFsvnj.exe2⤵PID:3096
-
-
C:\Windows\System\zNDEQps.exeC:\Windows\System\zNDEQps.exe2⤵PID:3080
-
-
C:\Windows\System\ZbdmEsd.exeC:\Windows\System\ZbdmEsd.exe2⤵PID:1160
-
-
C:\Windows\System\ptlGPeb.exeC:\Windows\System\ptlGPeb.exe2⤵PID:2260
-
-
C:\Windows\System\zriGFpl.exeC:\Windows\System\zriGFpl.exe2⤵PID:2632
-
-
C:\Windows\System\AFZnoVd.exeC:\Windows\System\AFZnoVd.exe2⤵PID:3812
-
-
C:\Windows\System\tXuuLBU.exeC:\Windows\System\tXuuLBU.exe2⤵PID:2600
-
-
C:\Windows\System\sPDvlrs.exeC:\Windows\System\sPDvlrs.exe2⤵PID:2092
-
-
C:\Windows\System\yaXKNDI.exeC:\Windows\System\yaXKNDI.exe2⤵PID:2728
-
-
C:\Windows\System\qgWSZlp.exeC:\Windows\System\qgWSZlp.exe2⤵PID:944
-
-
C:\Windows\System\tzMryKw.exeC:\Windows\System\tzMryKw.exe2⤵PID:2984
-
-
C:\Windows\System\GElbjtR.exeC:\Windows\System\GElbjtR.exe2⤵PID:3840
-
-
C:\Windows\System\sFHHYtT.exeC:\Windows\System\sFHHYtT.exe2⤵PID:2628
-
-
C:\Windows\System\wtwtkne.exeC:\Windows\System\wtwtkne.exe2⤵PID:2788
-
-
C:\Windows\System\abtkPBP.exeC:\Windows\System\abtkPBP.exe2⤵PID:2916
-
-
C:\Windows\System\UXduFEF.exeC:\Windows\System\UXduFEF.exe2⤵PID:2868
-
-
C:\Windows\System\PtAGQoD.exeC:\Windows\System\PtAGQoD.exe2⤵PID:2992
-
-
C:\Windows\System\ywTtCYT.exeC:\Windows\System\ywTtCYT.exe2⤵PID:1700
-
-
C:\Windows\System\eFuehkO.exeC:\Windows\System\eFuehkO.exe2⤵PID:3868
-
-
C:\Windows\System\EpklYnE.exeC:\Windows\System\EpklYnE.exe2⤵PID:1096
-
-
C:\Windows\System\gWvdyrZ.exeC:\Windows\System\gWvdyrZ.exe2⤵PID:1076
-
-
C:\Windows\System\TqGrIzx.exeC:\Windows\System\TqGrIzx.exe2⤵PID:2452
-
-
C:\Windows\System\gbpUxnj.exeC:\Windows\System\gbpUxnj.exe2⤵PID:1856
-
-
C:\Windows\System\DabOMsJ.exeC:\Windows\System\DabOMsJ.exe2⤵PID:2012
-
-
C:\Windows\System\IQhizRc.exeC:\Windows\System\IQhizRc.exe2⤵PID:864
-
-
C:\Windows\System\jLHTdHC.exeC:\Windows\System\jLHTdHC.exe2⤵PID:3896
-
-
C:\Windows\System\KhoSkos.exeC:\Windows\System\KhoSkos.exe2⤵PID:1032
-
-
C:\Windows\System\yEISNTW.exeC:\Windows\System\yEISNTW.exe2⤵PID:412
-
-
C:\Windows\System\zKAUHBV.exeC:\Windows\System\zKAUHBV.exe2⤵PID:2228
-
-
C:\Windows\System\dwCjSMr.exeC:\Windows\System\dwCjSMr.exe2⤵PID:588
-
-
C:\Windows\System\JNCOLrG.exeC:\Windows\System\JNCOLrG.exe2⤵PID:540
-
-
C:\Windows\System\IyufWmS.exeC:\Windows\System\IyufWmS.exe2⤵PID:3924
-
-
C:\Windows\System\wufILnH.exeC:\Windows\System\wufILnH.exe2⤵PID:2296
-
-
C:\Windows\System\PBOPcIt.exeC:\Windows\System\PBOPcIt.exe2⤵PID:2552
-
-
C:\Windows\System\WvouLrJ.exeC:\Windows\System\WvouLrJ.exe2⤵PID:1876
-
-
C:\Windows\System\agYqPvZ.exeC:\Windows\System\agYqPvZ.exe2⤵PID:956
-
-
C:\Windows\System\TFUJiUo.exeC:\Windows\System\TFUJiUo.exe2⤵PID:1648
-
-
C:\Windows\System\ulfSPFK.exeC:\Windows\System\ulfSPFK.exe2⤵PID:3952
-
-
C:\Windows\System\pBKMdjx.exeC:\Windows\System\pBKMdjx.exe2⤵PID:3304
-
-
C:\Windows\System\oorOzOZ.exeC:\Windows\System\oorOzOZ.exe2⤵PID:1464
-
-
C:\Windows\System\bdLwzON.exeC:\Windows\System\bdLwzON.exe2⤵PID:3360
-
-
C:\Windows\System\rcicjyG.exeC:\Windows\System\rcicjyG.exe2⤵PID:1524
-
-
C:\Windows\System\VvIyeTQ.exeC:\Windows\System\VvIyeTQ.exe2⤵PID:3456
-
-
C:\Windows\System\xfbYVXB.exeC:\Windows\System\xfbYVXB.exe2⤵PID:2128
-
-
C:\Windows\System\TsmwQso.exeC:\Windows\System\TsmwQso.exe2⤵PID:3436
-
-
C:\Windows\System\iAqbnuQ.exeC:\Windows\System\iAqbnuQ.exe2⤵PID:2352
-
-
C:\Windows\System\WioHyQj.exeC:\Windows\System\WioHyQj.exe2⤵PID:3712
-
-
C:\Windows\System\ccxyCut.exeC:\Windows\System\ccxyCut.exe2⤵PID:3776
-
-
C:\Windows\System\bQUVPyR.exeC:\Windows\System\bQUVPyR.exe2⤵PID:1764
-
-
C:\Windows\System\lvFFsIw.exeC:\Windows\System\lvFFsIw.exe2⤵PID:280
-
-
C:\Windows\System\sEexyPH.exeC:\Windows\System\sEexyPH.exe2⤵PID:108
-
-
C:\Windows\System\ymiMydp.exeC:\Windows\System\ymiMydp.exe2⤵PID:3980
-
-
C:\Windows\System\aTqRzwn.exeC:\Windows\System\aTqRzwn.exe2⤵PID:4056
-
-
C:\Windows\System\AoujwLW.exeC:\Windows\System\AoujwLW.exe2⤵PID:2896
-
-
C:\Windows\System\pXBMHit.exeC:\Windows\System\pXBMHit.exe2⤵PID:3292
-
-
C:\Windows\System\fFkySrn.exeC:\Windows\System\fFkySrn.exe2⤵PID:3332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD56307e032383fa322ce19e5119ab43660
SHA1f5abad5befe8d7272ea1a550157e7efd62afcd8b
SHA25604556186198237da4051c141e9c119f7386ebd9c791672c05d08038253d2a4bf
SHA512202b1d255f100b6047640d7600eb03e6c517c033c21adaab6740936fc4c3b769ef9ec7ca75f4d44ce430f0204215bed2ae27b6ac9feaec55f514a6e87856d739