Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:34
Behavioral task
behavioral1
Sample
1a2ca6850a3435657d14975db373d422.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
1a2ca6850a3435657d14975db373d422.exe
-
Size
784KB
-
MD5
1a2ca6850a3435657d14975db373d422
-
SHA1
552b5bd177b529e71c371ae7874ea123eb7e3549
-
SHA256
426808e2f4386af60b13671340d224338ec349b7d34b7405bf238224eb177ca6
-
SHA512
230924a359bdabfc7103b31fa45eb987387240efd6a8947475c8f8632b1293fd97843e546fce77f547490197c518a9c7460c2cc0b3e083027c223c24f9be9079
-
SSDEEP
24576:9Pqb6mx4zZ/bwyPIf+LqRuRQCCc5NsN9Xe:sbvxKZ/bwX4wuqcwXe
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3404-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3404-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4744-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4744-20-0x0000000005450000-0x00000000055E3000-memory.dmp xmrig behavioral2/memory/4744-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4744-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4744 1a2ca6850a3435657d14975db373d422.exe -
Executes dropped EXE 1 IoCs
pid Process 4744 1a2ca6850a3435657d14975db373d422.exe -
resource yara_rule behavioral2/memory/3404-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023230-11.dat upx behavioral2/memory/4744-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3404 1a2ca6850a3435657d14975db373d422.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3404 1a2ca6850a3435657d14975db373d422.exe 4744 1a2ca6850a3435657d14975db373d422.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3404 wrote to memory of 4744 3404 1a2ca6850a3435657d14975db373d422.exe 93 PID 3404 wrote to memory of 4744 3404 1a2ca6850a3435657d14975db373d422.exe 93 PID 3404 wrote to memory of 4744 3404 1a2ca6850a3435657d14975db373d422.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a2ca6850a3435657d14975db373d422.exe"C:\Users\Admin\AppData\Local\Temp\1a2ca6850a3435657d14975db373d422.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\1a2ca6850a3435657d14975db373d422.exeC:\Users\Admin\AppData\Local\Temp\1a2ca6850a3435657d14975db373d422.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4744
-