Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 21:14
Behavioral task
behavioral1
Sample
042e54b428eb00bde0e49b8539389361.exe
Resource
win7-20231215-en
General
-
Target
042e54b428eb00bde0e49b8539389361.exe
-
Size
2.3MB
-
MD5
042e54b428eb00bde0e49b8539389361
-
SHA1
d59f5712626afe0b71fa89fee617a17d07d753ee
-
SHA256
3779a8f262f4b21d7584128a73934e1a04f5c5141c8bd7515b96f1f89a5342b3
-
SHA512
20bc4837b1ef3fbb7e84344c2551bece395adb4c3acd0adc45a1478021eb38d887de7217c83190824e90b8e51ca288dbd633da370dc7d107f712e8f26495c1d8
-
SSDEEP
49152:UNPM/TjcXu5UrMmYZxzYHzNg4zgrnMKc5wAjk0d/5eKNka3pD:U2Tj6rMmYrz6G4T51jke/5DNpZ
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/5064-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/5064-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2060-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2060-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2060-21-0x00000000053B0000-0x0000000005543000-memory.dmp xmrig behavioral2/memory/2060-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/2060-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2060 042e54b428eb00bde0e49b8539389361.exe -
Executes dropped EXE 1 IoCs
pid Process 2060 042e54b428eb00bde0e49b8539389361.exe -
resource yara_rule behavioral2/memory/5064-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0006000000023205-11.dat upx behavioral2/memory/2060-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5064 042e54b428eb00bde0e49b8539389361.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5064 042e54b428eb00bde0e49b8539389361.exe 2060 042e54b428eb00bde0e49b8539389361.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 2060 5064 042e54b428eb00bde0e49b8539389361.exe 94 PID 5064 wrote to memory of 2060 5064 042e54b428eb00bde0e49b8539389361.exe 94 PID 5064 wrote to memory of 2060 5064 042e54b428eb00bde0e49b8539389361.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\042e54b428eb00bde0e49b8539389361.exe"C:\Users\Admin\AppData\Local\Temp\042e54b428eb00bde0e49b8539389361.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\042e54b428eb00bde0e49b8539389361.exeC:\Users\Admin\AppData\Local\Temp\042e54b428eb00bde0e49b8539389361.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2060
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
716KB
MD5fba8b1c87d59d9066483a65c91c3defd
SHA1d9da8d6dc4569dcd4a5fe9174731dd778a970bc9
SHA256e29b057e59aa976a8ecae5cbddff550754364ca58cfa1abeed78da703a170ef6
SHA5127a0415c1f1d2e2b65cc7630ea025419b082d664660933ac8bd9cb5a418af523c35b5199ba776696087c4a6a526f931a96f383a7c2bfebb2fffeb0ac3dd8246dd