Analysis
-
max time kernel
144s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 17:23
Behavioral task
behavioral1
Sample
031725a30dee0f4bcdf7856c4deb1ef6.exe
Resource
win7-20231215-en
General
-
Target
031725a30dee0f4bcdf7856c4deb1ef6.exe
-
Size
784KB
-
MD5
031725a30dee0f4bcdf7856c4deb1ef6
-
SHA1
7a83e853da6ac1bb9e679a85f41b70eced88bf92
-
SHA256
e185015997575b783da3dc3f8ac0be09452c73ce1c2c4ff2b780bdeac48fc096
-
SHA512
1d6340b0c3d7b4540dd2bc7873535d904bd12d22d5f3daa69c74a8354f6f61dfc39e1a8aabfd5a5d9d8470f6ad8e892a8bd3e27f1d1a19371d4c5c1da124ad05
-
SSDEEP
24576:5g/nW3BU4MCu3mOzD3oEa/wyzFSIAGrs4:W/W3Bm9fD3TaYyzFfA
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4592-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4592-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4996-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4996-21-0x0000000005430000-0x00000000055C3000-memory.dmp xmrig behavioral2/memory/4996-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4996-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4996 031725a30dee0f4bcdf7856c4deb1ef6.exe -
Executes dropped EXE 1 IoCs
pid Process 4996 031725a30dee0f4bcdf7856c4deb1ef6.exe -
resource yara_rule behavioral2/memory/4592-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000e000000023162-11.dat upx behavioral2/memory/4996-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4592 031725a30dee0f4bcdf7856c4deb1ef6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4592 031725a30dee0f4bcdf7856c4deb1ef6.exe 4996 031725a30dee0f4bcdf7856c4deb1ef6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4592 wrote to memory of 4996 4592 031725a30dee0f4bcdf7856c4deb1ef6.exe 90 PID 4592 wrote to memory of 4996 4592 031725a30dee0f4bcdf7856c4deb1ef6.exe 90 PID 4592 wrote to memory of 4996 4592 031725a30dee0f4bcdf7856c4deb1ef6.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\031725a30dee0f4bcdf7856c4deb1ef6.exe"C:\Users\Admin\AppData\Local\Temp\031725a30dee0f4bcdf7856c4deb1ef6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\031725a30dee0f4bcdf7856c4deb1ef6.exeC:\Users\Admin\AppData\Local\Temp\031725a30dee0f4bcdf7856c4deb1ef6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD589a73eb75a8e90f7eab2570c14a41f45
SHA1caf359d3e56ec785c7065b710b0fce4d4fda9db2
SHA2563b3b188b8dca0a650298ae3d6277953e8f6c896e04f9a0f3167dbde98db404aa
SHA5124e7ea82bea99096dfbca65a4f4c6b2dc98dcdc5efd010109561fd2dc5b80347e3360a82a3436fc71166645630b485918cee563ea9e577ba6540ae1e5177fbc5d