Analysis
-
max time kernel
135s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:31
Behavioral task
behavioral1
Sample
1235dfd18d0f6df36733b1143d1cc330.exe
Resource
win7-20231215-en
General
-
Target
1235dfd18d0f6df36733b1143d1cc330.exe
-
Size
784KB
-
MD5
1235dfd18d0f6df36733b1143d1cc330
-
SHA1
fc96a6910fe660ed53faba402a9bcca2a6bc4578
-
SHA256
02d6f7fa42b6f272b62c320a2989f938db7f4be91228a3b4eb45e748423b0e29
-
SHA512
79bfb7826189c05d2688e03969c2db0e9f2ad75d99e248a5256a083f804e5e372a265975f2859cb0f5ab322e6287bb22a1ec3a57a76c7879fdaf242e90147625
-
SSDEEP
12288:VkWLkT2kMoA/Bfum/8q4+5E8OiyD1rEgnjJald1G1zshb5mZfYT5+7IBRPZO1/RZ:fLki7odg8mE79FLc01zsCGtz2/YB
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4976-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4976-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2348-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2348-20-0x0000000005450000-0x00000000055E3000-memory.dmp xmrig behavioral2/memory/2348-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2348-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2348 1235dfd18d0f6df36733b1143d1cc330.exe -
Executes dropped EXE 1 IoCs
pid Process 2348 1235dfd18d0f6df36733b1143d1cc330.exe -
resource yara_rule behavioral2/memory/4976-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000300000001e715-11.dat upx behavioral2/memory/2348-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4976 1235dfd18d0f6df36733b1143d1cc330.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4976 1235dfd18d0f6df36733b1143d1cc330.exe 2348 1235dfd18d0f6df36733b1143d1cc330.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2348 4976 1235dfd18d0f6df36733b1143d1cc330.exe 93 PID 4976 wrote to memory of 2348 4976 1235dfd18d0f6df36733b1143d1cc330.exe 93 PID 4976 wrote to memory of 2348 4976 1235dfd18d0f6df36733b1143d1cc330.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1235dfd18d0f6df36733b1143d1cc330.exe"C:\Users\Admin\AppData\Local\Temp\1235dfd18d0f6df36733b1143d1cc330.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\1235dfd18d0f6df36733b1143d1cc330.exeC:\Users\Admin\AppData\Local\Temp\1235dfd18d0f6df36733b1143d1cc330.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2348
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD55d24db24078ba380f6fa326a14bdabea
SHA1f192227fee70775187a3fa72a5b365dd24ce50f1
SHA256d5c41512c741732dda76f090ecec9c2d6aa0943d996d0ca28ad00802c2a15427
SHA5124cb9da88a34aeb36e071d1ca163d33de25ae29b3e1bf9afbb0e87941fea5b35a334a94bd049b1bb1c565035ad90d4f7b43ae9796262e03d24733855c0f38d8cb