Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 00:52
Behavioral task
behavioral1
Sample
092482069b0ddb2d83a73282f97f7955.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
General
-
Target
092482069b0ddb2d83a73282f97f7955.exe
-
Size
784KB
-
MD5
092482069b0ddb2d83a73282f97f7955
-
SHA1
49e268e0df8c537fa8d51fb1884332d245281c1a
-
SHA256
32928976d3032954804d9242fe5e9de1fd98ecd7a5e8f6ed80ef01ef499f9ca3
-
SHA512
c11f63e63ff1110333e38f91c1da51ee71e53d40c257152ceb9d9b32ad2a7345a538ddb326b759eb14b9910ca1e3fbd81ce9da44c584aa7cfdcda93f7cc778bc
-
SSDEEP
12288:ldl13DJXClGouaU3/4QDU+LmVnNvZ03dGScprTHO9qhuzUxsmqMdMnpxUQ:lDXw7uh3///AnOGScxDuzRmqFpxR
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1560-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1648-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1648-21-0x0000000005530000-0x00000000056C3000-memory.dmp xmrig behavioral2/memory/1648-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1648-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1560-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1648 092482069b0ddb2d83a73282f97f7955.exe -
Executes dropped EXE 1 IoCs
pid Process 1648 092482069b0ddb2d83a73282f97f7955.exe -
resource yara_rule behavioral2/memory/1560-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/1648-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1560 092482069b0ddb2d83a73282f97f7955.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1560 092482069b0ddb2d83a73282f97f7955.exe 1648 092482069b0ddb2d83a73282f97f7955.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1560 wrote to memory of 1648 1560 092482069b0ddb2d83a73282f97f7955.exe 25 PID 1560 wrote to memory of 1648 1560 092482069b0ddb2d83a73282f97f7955.exe 25 PID 1560 wrote to memory of 1648 1560 092482069b0ddb2d83a73282f97f7955.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\092482069b0ddb2d83a73282f97f7955.exe"C:\Users\Admin\AppData\Local\Temp\092482069b0ddb2d83a73282f97f7955.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\092482069b0ddb2d83a73282f97f7955.exeC:\Users\Admin\AppData\Local\Temp\092482069b0ddb2d83a73282f97f7955.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1648
-