Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:21
Behavioral task
behavioral1
Sample
1ccef4b1d719b46ce641843e59579ef2.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
1ccef4b1d719b46ce641843e59579ef2.exe
-
Size
784KB
-
MD5
1ccef4b1d719b46ce641843e59579ef2
-
SHA1
57425df83e76bd1c92ab1dab3f1955970693eb54
-
SHA256
15323dfc117ee78e552909a2a3edf6b525e44612ada4ea22d3050a9312de73a1
-
SHA512
8dbb0408628c4f59866ffb43ac72fdc141c1415634ead3097e3738b0b190143e778edf029bf38a695be932fc23a252a4eb1fed98608ee7968e6d70a74059aef0
-
SSDEEP
24576:wOvU0g+7mCuk9UcK2rh30+BUMW0FLZUUF9j:wOvYlcK2pjBPLZ7F9j
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/3068-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2792-19-0x0000000000400000-0x0000000000712000-memory.dmp xmrig behavioral1/memory/2792-26-0x0000000003100000-0x0000000003293000-memory.dmp xmrig behavioral1/memory/2792-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2792-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2792-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2792-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3068-16-0x0000000003270000-0x0000000003582000-memory.dmp xmrig behavioral1/memory/3068-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2792 1ccef4b1d719b46ce641843e59579ef2.exe -
Executes dropped EXE 1 IoCs
pid Process 2792 1ccef4b1d719b46ce641843e59579ef2.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 1ccef4b1d719b46ce641843e59579ef2.exe -
resource yara_rule behavioral1/memory/3068-0-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3068 1ccef4b1d719b46ce641843e59579ef2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3068 1ccef4b1d719b46ce641843e59579ef2.exe 2792 1ccef4b1d719b46ce641843e59579ef2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2792 3068 1ccef4b1d719b46ce641843e59579ef2.exe 18 PID 3068 wrote to memory of 2792 3068 1ccef4b1d719b46ce641843e59579ef2.exe 18 PID 3068 wrote to memory of 2792 3068 1ccef4b1d719b46ce641843e59579ef2.exe 18 PID 3068 wrote to memory of 2792 3068 1ccef4b1d719b46ce641843e59579ef2.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ccef4b1d719b46ce641843e59579ef2.exe"C:\Users\Admin\AppData\Local\Temp\1ccef4b1d719b46ce641843e59579ef2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\1ccef4b1d719b46ce641843e59579ef2.exeC:\Users\Admin\AppData\Local\Temp\1ccef4b1d719b46ce641843e59579ef2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2792
-