Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 22:53
Behavioral task
behavioral1
Sample
0631f073700989b50ea9c7b323d47dd4.exe
Resource
win7-20231129-en
windows7-x64
9 signatures
150 seconds
General
-
Target
0631f073700989b50ea9c7b323d47dd4.exe
-
Size
784KB
-
MD5
0631f073700989b50ea9c7b323d47dd4
-
SHA1
7c4df0798218193072f6435339f1025b67621f05
-
SHA256
832b8add161eb54d3d11a2f522a727159456076cf3f58cb49f87c682f17b873a
-
SHA512
956a08ce5c6e40fc62920716526205985e5703603b12481a1164e9518096c862e3eb90af2284adc3c66242a8fc52700d9024cf2c30808c411cb7837a013d1dde
-
SSDEEP
24576:RKr3ABEz3RIzsEHuCqzHTHdpDN5VRGIbkBt9jd/a2:ZCzBicTHdpjVRzMjh
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/1368-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2708-27-0x0000000002FF0000-0x0000000003183000-memory.dmp xmrig behavioral1/memory/2708-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2708-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2708-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2708-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1368-15-0x0000000003110000-0x0000000003422000-memory.dmp xmrig behavioral1/memory/1368-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2708 0631f073700989b50ea9c7b323d47dd4.exe -
Executes dropped EXE 1 IoCs
pid Process 2708 0631f073700989b50ea9c7b323d47dd4.exe -
Loads dropped DLL 1 IoCs
pid Process 1368 0631f073700989b50ea9c7b323d47dd4.exe -
resource yara_rule behavioral1/memory/1368-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/memory/2708-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1368 0631f073700989b50ea9c7b323d47dd4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1368 0631f073700989b50ea9c7b323d47dd4.exe 2708 0631f073700989b50ea9c7b323d47dd4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2708 1368 0631f073700989b50ea9c7b323d47dd4.exe 17 PID 1368 wrote to memory of 2708 1368 0631f073700989b50ea9c7b323d47dd4.exe 17 PID 1368 wrote to memory of 2708 1368 0631f073700989b50ea9c7b323d47dd4.exe 17 PID 1368 wrote to memory of 2708 1368 0631f073700989b50ea9c7b323d47dd4.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\0631f073700989b50ea9c7b323d47dd4.exe"C:\Users\Admin\AppData\Local\Temp\0631f073700989b50ea9c7b323d47dd4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\0631f073700989b50ea9c7b323d47dd4.exeC:\Users\Admin\AppData\Local\Temp\0631f073700989b50ea9c7b323d47dd4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2708
-