Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:46
Behavioral task
behavioral1
Sample
222c42da1db2e96d298cff4ad59cdca4.exe
Resource
win7-20231215-en
General
-
Target
222c42da1db2e96d298cff4ad59cdca4.exe
-
Size
784KB
-
MD5
222c42da1db2e96d298cff4ad59cdca4
-
SHA1
2772405384a88cfb9d0ff30b0aede530d2209c20
-
SHA256
8c75c8f146d79e1647404e5bebad41a57e1fda04e46e81a9ff3c0ab170a4d3b5
-
SHA512
9e04518ce59442e241e02181eca9024af7dd6e70742125e4a38f9d93f4d7ef3312542ab0445aba4a0642df5fafdd213a79f86c50e083af7cda85c2e8771e49c6
-
SSDEEP
12288:mxL0VB1m8MGf7inEAji0HSuTUPDAfY1HTeX8kYs9q4jCLe9+3qZRRHoLsBm:DjA8MGfGnE0i0yuIPD/RTRkX1euHAYo
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2972-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2972-14-0x0000000003180000-0x0000000003492000-memory.dmp xmrig behavioral1/memory/2972-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2908-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2908-25-0x0000000003150000-0x00000000032E3000-memory.dmp xmrig behavioral1/memory/2908-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2908-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2908 222c42da1db2e96d298cff4ad59cdca4.exe -
Executes dropped EXE 1 IoCs
pid Process 2908 222c42da1db2e96d298cff4ad59cdca4.exe -
Loads dropped DLL 1 IoCs
pid Process 2972 222c42da1db2e96d298cff4ad59cdca4.exe -
resource yara_rule behavioral1/memory/2972-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x00090000000120e1-10.dat upx behavioral1/memory/2972-14-0x0000000003180000-0x0000000003492000-memory.dmp upx behavioral1/memory/2908-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2972 222c42da1db2e96d298cff4ad59cdca4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2972 222c42da1db2e96d298cff4ad59cdca4.exe 2908 222c42da1db2e96d298cff4ad59cdca4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2908 2972 222c42da1db2e96d298cff4ad59cdca4.exe 29 PID 2972 wrote to memory of 2908 2972 222c42da1db2e96d298cff4ad59cdca4.exe 29 PID 2972 wrote to memory of 2908 2972 222c42da1db2e96d298cff4ad59cdca4.exe 29 PID 2972 wrote to memory of 2908 2972 222c42da1db2e96d298cff4ad59cdca4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\222c42da1db2e96d298cff4ad59cdca4.exe"C:\Users\Admin\AppData\Local\Temp\222c42da1db2e96d298cff4ad59cdca4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\222c42da1db2e96d298cff4ad59cdca4.exeC:\Users\Admin\AppData\Local\Temp\222c42da1db2e96d298cff4ad59cdca4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2908
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5f2a5ad7714ba6d5e8dba4f47a84aefe8
SHA17e506b9ac15570d358d8393ada416c3774881240
SHA25652aa96573af5005b28b767c8275689f07d654c566c7ed771deb14bc316e349d6
SHA512efa4be52472634c1140af5234b4a2b10cab275f7dfd58ccd164a2fce5f8842f98f49fbea33c50b71a1a2f30fa9a4e9870f58138970908fc94b3e21a8bb21e087