Analysis
-
max time kernel
143s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:02
Behavioral task
behavioral1
Sample
0f6f5121b1ddbb8b877c6f47cb4fd290.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
0f6f5121b1ddbb8b877c6f47cb4fd290.exe
-
Size
2.3MB
-
MD5
0f6f5121b1ddbb8b877c6f47cb4fd290
-
SHA1
7de75cd25b2ab4b1c708c084a8bdbc8a8ae98809
-
SHA256
017cdd79be5546cb477547e539a9bc32ad64926e1a56be599e4d04c223edd59a
-
SHA512
a07ade971854c8c51e015c428d3f0293adc70f7f2b0304a347427036fe89a36d6c22e3eb41883d9472557f4ff011c97974f115c32a69a6d4fb6e862d39bda467
-
SSDEEP
49152:UOkYswliFYdSXImIWkQhb3E6YiInti55M/ZWdq8K:UvwrdSQwhb3vYi4ti55GU
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3300-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3300-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1528-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1528-20-0x00000000053D0000-0x0000000005563000-memory.dmp xmrig behavioral2/memory/1528-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1528-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1528 0f6f5121b1ddbb8b877c6f47cb4fd290.exe -
Executes dropped EXE 1 IoCs
pid Process 1528 0f6f5121b1ddbb8b877c6f47cb4fd290.exe -
resource yara_rule behavioral2/memory/3300-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/1528-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3300 0f6f5121b1ddbb8b877c6f47cb4fd290.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3300 0f6f5121b1ddbb8b877c6f47cb4fd290.exe 1528 0f6f5121b1ddbb8b877c6f47cb4fd290.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3300 wrote to memory of 1528 3300 0f6f5121b1ddbb8b877c6f47cb4fd290.exe 22 PID 3300 wrote to memory of 1528 3300 0f6f5121b1ddbb8b877c6f47cb4fd290.exe 22 PID 3300 wrote to memory of 1528 3300 0f6f5121b1ddbb8b877c6f47cb4fd290.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f6f5121b1ddbb8b877c6f47cb4fd290.exe"C:\Users\Admin\AppData\Local\Temp\0f6f5121b1ddbb8b877c6f47cb4fd290.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\0f6f5121b1ddbb8b877c6f47cb4fd290.exeC:\Users\Admin\AppData\Local\Temp\0f6f5121b1ddbb8b877c6f47cb4fd290.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1528
-