Analysis
-
max time kernel
128s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 22:53
Behavioral task
behavioral1
Sample
0631f073700989b50ea9c7b323d47dd4.exe
Resource
win7-20231129-en
General
-
Target
0631f073700989b50ea9c7b323d47dd4.exe
-
Size
784KB
-
MD5
0631f073700989b50ea9c7b323d47dd4
-
SHA1
7c4df0798218193072f6435339f1025b67621f05
-
SHA256
832b8add161eb54d3d11a2f522a727159456076cf3f58cb49f87c682f17b873a
-
SHA512
956a08ce5c6e40fc62920716526205985e5703603b12481a1164e9518096c862e3eb90af2284adc3c66242a8fc52700d9024cf2c30808c411cb7837a013d1dde
-
SSDEEP
24576:RKr3ABEz3RIzsEHuCqzHTHdpDN5VRGIbkBt9jd/a2:ZCzBicTHdpjVRzMjh
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4880-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4880-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1940-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1940-20-0x0000000005400000-0x0000000005593000-memory.dmp xmrig behavioral2/memory/1940-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1940-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1940 0631f073700989b50ea9c7b323d47dd4.exe -
Executes dropped EXE 1 IoCs
pid Process 1940 0631f073700989b50ea9c7b323d47dd4.exe -
resource yara_rule behavioral2/memory/4880-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0006000000023214-11.dat upx behavioral2/memory/1940-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4880 0631f073700989b50ea9c7b323d47dd4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4880 0631f073700989b50ea9c7b323d47dd4.exe 1940 0631f073700989b50ea9c7b323d47dd4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4880 wrote to memory of 1940 4880 0631f073700989b50ea9c7b323d47dd4.exe 91 PID 4880 wrote to memory of 1940 4880 0631f073700989b50ea9c7b323d47dd4.exe 91 PID 4880 wrote to memory of 1940 4880 0631f073700989b50ea9c7b323d47dd4.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0631f073700989b50ea9c7b323d47dd4.exe"C:\Users\Admin\AppData\Local\Temp\0631f073700989b50ea9c7b323d47dd4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\0631f073700989b50ea9c7b323d47dd4.exeC:\Users\Admin\AppData\Local\Temp\0631f073700989b50ea9c7b323d47dd4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD5ac9787440cebc05a1ac9d41bde7e6ccf
SHA13266a5a1e6264510847c66f2a37c39416aee8053
SHA2563d9a4a9a4af9d0000909ebb33c8c45f46ec32c6213dfb3ffb34894e1c043723d
SHA512cc37a9d5ef04c0e5dbfc2af8a8e1b72fe607a508bd90e283e7d40d83241816b8c391ad6951327149e020a6696bedb88922846ce883d705e8f873ae2353b56c0f