Analysis
-
max time kernel
158s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
03e9cb07a5d44383f5b9bc58d8964fc0.exe
Resource
win7-20231129-en
General
-
Target
03e9cb07a5d44383f5b9bc58d8964fc0.exe
-
Size
2.3MB
-
MD5
03e9cb07a5d44383f5b9bc58d8964fc0
-
SHA1
9a0c811639b49afa29f7cf5f02541b52a4352f62
-
SHA256
bd814e7ed78662f065287a80983a1846907fd443e654f38fca9001b66a6cfc00
-
SHA512
d881636887ce9adefecad86e5132f369b4ec998b31f861081e01e97980e04b59d7d094190a882d8c3014f7215ddeb02f392d7f4cf7a25da96b3eac4558d9bc00
-
SSDEEP
49152:csPkmam6ZeFalhXhM6sxU4q/iTTXn+hJfyDtnvY9:cor60clhC6sxUN4y7I12
Malware Config
Signatures
-
XMRig Miner payload 3 IoCs
resource yara_rule behavioral2/memory/3024-18-0x0000000000400000-0x000000000070F000-memory.dmp xmrig behavioral2/memory/3024-21-0x0000000000400000-0x000000000070F000-memory.dmp xmrig behavioral2/memory/3024-36-0x0000000000400000-0x000000000070F000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/3024-11-0x0000000000400000-0x000000000070F000-memory.dmp upx behavioral2/memory/3024-13-0x0000000000400000-0x000000000070F000-memory.dmp upx behavioral2/memory/3024-14-0x0000000000400000-0x000000000070F000-memory.dmp upx behavioral2/memory/3024-16-0x0000000000400000-0x000000000070F000-memory.dmp upx behavioral2/memory/3024-17-0x0000000000400000-0x000000000070F000-memory.dmp upx behavioral2/memory/3024-18-0x0000000000400000-0x000000000070F000-memory.dmp upx behavioral2/memory/3024-21-0x0000000000400000-0x000000000070F000-memory.dmp upx behavioral2/memory/3024-36-0x0000000000400000-0x000000000070F000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1876 set thread context of 2300 1876 03e9cb07a5d44383f5b9bc58d8964fc0.exe 89 PID 2300 set thread context of 3024 2300 03e9cb07a5d44383f5b9bc58d8964fc0.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1876 03e9cb07a5d44383f5b9bc58d8964fc0.exe 1876 03e9cb07a5d44383f5b9bc58d8964fc0.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1876 03e9cb07a5d44383f5b9bc58d8964fc0.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2300 03e9cb07a5d44383f5b9bc58d8964fc0.exe Token: SeLockMemoryPrivilege 3024 notepad.exe Token: SeLockMemoryPrivilege 3024 notepad.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2300 1876 03e9cb07a5d44383f5b9bc58d8964fc0.exe 89 PID 1876 wrote to memory of 2300 1876 03e9cb07a5d44383f5b9bc58d8964fc0.exe 89 PID 1876 wrote to memory of 2300 1876 03e9cb07a5d44383f5b9bc58d8964fc0.exe 89 PID 2300 wrote to memory of 3024 2300 03e9cb07a5d44383f5b9bc58d8964fc0.exe 90 PID 2300 wrote to memory of 3024 2300 03e9cb07a5d44383f5b9bc58d8964fc0.exe 90 PID 2300 wrote to memory of 3024 2300 03e9cb07a5d44383f5b9bc58d8964fc0.exe 90 PID 2300 wrote to memory of 3024 2300 03e9cb07a5d44383f5b9bc58d8964fc0.exe 90 PID 2300 wrote to memory of 3024 2300 03e9cb07a5d44383f5b9bc58d8964fc0.exe 90 PID 2300 wrote to memory of 3024 2300 03e9cb07a5d44383f5b9bc58d8964fc0.exe 90 PID 2300 wrote to memory of 3024 2300 03e9cb07a5d44383f5b9bc58d8964fc0.exe 90 PID 2300 wrote to memory of 3024 2300 03e9cb07a5d44383f5b9bc58d8964fc0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\03e9cb07a5d44383f5b9bc58d8964fc0.exe"C:\Users\Admin\AppData\Local\Temp\03e9cb07a5d44383f5b9bc58d8964fc0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\03e9cb07a5d44383f5b9bc58d8964fc0.exe"C:\Users\Admin\AppData\Local\Temp\03e9cb07a5d44383f5b9bc58d8964fc0.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\rliQSisJaf\cfgi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b5f6e1fb86e75287e6c27cb226ca7054
SHA1efcaa2abc30bcf0ff4026d9643a7df6942f85480
SHA2569e4847c0078af63ce97eafa447d87aea3115a258181d85f2e8d8387cee9044ce
SHA512754bbe401a3763a82ca9dcd048c3200043ae557d52a6590b4915e2d5835da01e345c5d00467dc4278f50569dfdcbc1d189d523059b40073dfaf0b54618bb7b4b