Analysis
-
max time kernel
147s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 10:27
Behavioral task
behavioral1
Sample
15e468005760dc6941dd117949115be9.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
General
-
Target
15e468005760dc6941dd117949115be9.exe
-
Size
2.3MB
-
MD5
15e468005760dc6941dd117949115be9
-
SHA1
787254d4ad61f4c71bc412d50b46f18bf39b5552
-
SHA256
b415a8d5cfe5ab23c1445b4181f82e80a03628e190668dc4e48eec0d26a293fc
-
SHA512
838fc76484651e72d7f011e0a5f286439925d69ce68a4e0520096e7bc1b06fb8c96f2de5742d0bbb40007846e1bde526fe16f390ba564b4bd59f42f51be59ed0
-
SSDEEP
49152:AVxsu8OLKbDoyIWTpNhblF6F80Is7xo1FJyJQ8+ff:AVxsu8O2bDrjTpLbj6a/stAEJ
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4976-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4976-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2260-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2260-21-0x0000000005450000-0x00000000055E3000-memory.dmp xmrig behavioral2/memory/2260-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2260-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2260 15e468005760dc6941dd117949115be9.exe -
Executes dropped EXE 1 IoCs
pid Process 2260 15e468005760dc6941dd117949115be9.exe -
resource yara_rule behavioral2/memory/4976-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/2260-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4976 15e468005760dc6941dd117949115be9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4976 15e468005760dc6941dd117949115be9.exe 2260 15e468005760dc6941dd117949115be9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2260 4976 15e468005760dc6941dd117949115be9.exe 23 PID 4976 wrote to memory of 2260 4976 15e468005760dc6941dd117949115be9.exe 23 PID 4976 wrote to memory of 2260 4976 15e468005760dc6941dd117949115be9.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\15e468005760dc6941dd117949115be9.exe"C:\Users\Admin\AppData\Local\Temp\15e468005760dc6941dd117949115be9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\15e468005760dc6941dd117949115be9.exeC:\Users\Admin\AppData\Local\Temp\15e468005760dc6941dd117949115be9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2260
-