Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:02
Behavioral task
behavioral1
Sample
06647f5bd3095a6fb53bd86b82d1da96.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
06647f5bd3095a6fb53bd86b82d1da96.exe
-
Size
1.5MB
-
MD5
06647f5bd3095a6fb53bd86b82d1da96
-
SHA1
f495f0417466bf27895a761d11853f2f983ce002
-
SHA256
e9979481df346c2cdbe572c3a8c2a070f79ed0203d92478b29c97b4b66930e0c
-
SHA512
af7cc4ae0aef350df4f67c2669b6b6cba3c83f64426634bb70dd2e23a0024fc7cbeaa456841f846fbfcece069c56316b46032bfea34735be0072b963133343b0
-
SSDEEP
49152:aEgXa7vmHdnfQh9qVw1HenXeRVd8hURmrWcy:Cqz842JWd8hURcy
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/2012-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2732-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2732-18-0x0000000000400000-0x0000000000712000-memory.dmp xmrig behavioral1/memory/2732-27-0x0000000003100000-0x0000000003293000-memory.dmp xmrig behavioral1/memory/2732-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2732-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2732-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2012-16-0x0000000003310000-0x0000000003622000-memory.dmp xmrig behavioral1/memory/2012-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2732 06647f5bd3095a6fb53bd86b82d1da96.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 06647f5bd3095a6fb53bd86b82d1da96.exe -
Loads dropped DLL 1 IoCs
pid Process 2012 06647f5bd3095a6fb53bd86b82d1da96.exe -
resource yara_rule behavioral1/memory/2012-0-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2012 06647f5bd3095a6fb53bd86b82d1da96.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2012 06647f5bd3095a6fb53bd86b82d1da96.exe 2732 06647f5bd3095a6fb53bd86b82d1da96.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2732 2012 06647f5bd3095a6fb53bd86b82d1da96.exe 17 PID 2012 wrote to memory of 2732 2012 06647f5bd3095a6fb53bd86b82d1da96.exe 17 PID 2012 wrote to memory of 2732 2012 06647f5bd3095a6fb53bd86b82d1da96.exe 17 PID 2012 wrote to memory of 2732 2012 06647f5bd3095a6fb53bd86b82d1da96.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\06647f5bd3095a6fb53bd86b82d1da96.exeC:\Users\Admin\AppData\Local\Temp\06647f5bd3095a6fb53bd86b82d1da96.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2732
-
C:\Users\Admin\AppData\Local\Temp\06647f5bd3095a6fb53bd86b82d1da96.exe"C:\Users\Admin\AppData\Local\Temp\06647f5bd3095a6fb53bd86b82d1da96.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2012