Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:21
Behavioral task
behavioral1
Sample
1ccef4b1d719b46ce641843e59579ef2.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
1ccef4b1d719b46ce641843e59579ef2.exe
-
Size
784KB
-
MD5
1ccef4b1d719b46ce641843e59579ef2
-
SHA1
57425df83e76bd1c92ab1dab3f1955970693eb54
-
SHA256
15323dfc117ee78e552909a2a3edf6b525e44612ada4ea22d3050a9312de73a1
-
SHA512
8dbb0408628c4f59866ffb43ac72fdc141c1415634ead3097e3738b0b190143e778edf029bf38a695be932fc23a252a4eb1fed98608ee7968e6d70a74059aef0
-
SSDEEP
24576:wOvU0g+7mCuk9UcK2rh30+BUMW0FLZUUF9j:wOvYlcK2pjBPLZ7F9j
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4992-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4992-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2196-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2196-22-0x00000000053A0000-0x0000000005533000-memory.dmp xmrig behavioral2/memory/2196-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2196-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2196 1ccef4b1d719b46ce641843e59579ef2.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 1ccef4b1d719b46ce641843e59579ef2.exe -
resource yara_rule behavioral2/memory/4992-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/2196-13-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00070000000231fe-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4992 1ccef4b1d719b46ce641843e59579ef2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4992 1ccef4b1d719b46ce641843e59579ef2.exe 2196 1ccef4b1d719b46ce641843e59579ef2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2196 4992 1ccef4b1d719b46ce641843e59579ef2.exe 22 PID 4992 wrote to memory of 2196 4992 1ccef4b1d719b46ce641843e59579ef2.exe 22 PID 4992 wrote to memory of 2196 4992 1ccef4b1d719b46ce641843e59579ef2.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ccef4b1d719b46ce641843e59579ef2.exe"C:\Users\Admin\AppData\Local\Temp\1ccef4b1d719b46ce641843e59579ef2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\1ccef4b1d719b46ce641843e59579ef2.exeC:\Users\Admin\AppData\Local\Temp\1ccef4b1d719b46ce641843e59579ef2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2196
-