Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:27
Behavioral task
behavioral1
Sample
15e468005760dc6941dd117949115be9.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
15e468005760dc6941dd117949115be9.exe
-
Size
2.3MB
-
MD5
15e468005760dc6941dd117949115be9
-
SHA1
787254d4ad61f4c71bc412d50b46f18bf39b5552
-
SHA256
b415a8d5cfe5ab23c1445b4181f82e80a03628e190668dc4e48eec0d26a293fc
-
SHA512
838fc76484651e72d7f011e0a5f286439925d69ce68a4e0520096e7bc1b06fb8c96f2de5742d0bbb40007846e1bde526fe16f390ba564b4bd59f42f51be59ed0
-
SSDEEP
49152:AVxsu8OLKbDoyIWTpNhblF6F80Is7xo1FJyJQ8+ff:AVxsu8O2bDrjTpLbj6a/stAEJ
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/2076-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2864-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2864-26-0x0000000003200000-0x0000000003393000-memory.dmp xmrig behavioral1/memory/2864-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2864-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2076-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2864 15e468005760dc6941dd117949115be9.exe -
Executes dropped EXE 1 IoCs
pid Process 2864 15e468005760dc6941dd117949115be9.exe -
Loads dropped DLL 1 IoCs
pid Process 2076 15e468005760dc6941dd117949115be9.exe -
resource yara_rule behavioral1/memory/2076-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/memory/2864-17-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/memory/2076-15-0x00000000035F0000-0x0000000003902000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2076 15e468005760dc6941dd117949115be9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2076 15e468005760dc6941dd117949115be9.exe 2864 15e468005760dc6941dd117949115be9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2864 2076 15e468005760dc6941dd117949115be9.exe 18 PID 2076 wrote to memory of 2864 2076 15e468005760dc6941dd117949115be9.exe 18 PID 2076 wrote to memory of 2864 2076 15e468005760dc6941dd117949115be9.exe 18 PID 2076 wrote to memory of 2864 2076 15e468005760dc6941dd117949115be9.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\15e468005760dc6941dd117949115be9.exe"C:\Users\Admin\AppData\Local\Temp\15e468005760dc6941dd117949115be9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\15e468005760dc6941dd117949115be9.exeC:\Users\Admin\AppData\Local\Temp\15e468005760dc6941dd117949115be9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2864
-