Analysis
-
max time kernel
162s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:46
Behavioral task
behavioral1
Sample
222c42da1db2e96d298cff4ad59cdca4.exe
Resource
win7-20231215-en
General
-
Target
222c42da1db2e96d298cff4ad59cdca4.exe
-
Size
784KB
-
MD5
222c42da1db2e96d298cff4ad59cdca4
-
SHA1
2772405384a88cfb9d0ff30b0aede530d2209c20
-
SHA256
8c75c8f146d79e1647404e5bebad41a57e1fda04e46e81a9ff3c0ab170a4d3b5
-
SHA512
9e04518ce59442e241e02181eca9024af7dd6e70742125e4a38f9d93f4d7ef3312542ab0445aba4a0642df5fafdd213a79f86c50e083af7cda85c2e8771e49c6
-
SSDEEP
12288:mxL0VB1m8MGf7inEAji0HSuTUPDAfY1HTeX8kYs9q4jCLe9+3qZRRHoLsBm:DjA8MGfGnE0i0yuIPD/RTRkX1euHAYo
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/2384-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2384-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1936-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1936-21-0x0000000005550000-0x00000000056E3000-memory.dmp xmrig behavioral2/memory/1936-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1936-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1936 222c42da1db2e96d298cff4ad59cdca4.exe -
Executes dropped EXE 1 IoCs
pid Process 1936 222c42da1db2e96d298cff4ad59cdca4.exe -
resource yara_rule behavioral2/memory/2384-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023222-11.dat upx behavioral2/memory/1936-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2384 222c42da1db2e96d298cff4ad59cdca4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2384 222c42da1db2e96d298cff4ad59cdca4.exe 1936 222c42da1db2e96d298cff4ad59cdca4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1936 2384 222c42da1db2e96d298cff4ad59cdca4.exe 91 PID 2384 wrote to memory of 1936 2384 222c42da1db2e96d298cff4ad59cdca4.exe 91 PID 2384 wrote to memory of 1936 2384 222c42da1db2e96d298cff4ad59cdca4.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\222c42da1db2e96d298cff4ad59cdca4.exe"C:\Users\Admin\AppData\Local\Temp\222c42da1db2e96d298cff4ad59cdca4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\222c42da1db2e96d298cff4ad59cdca4.exeC:\Users\Admin\AppData\Local\Temp\222c42da1db2e96d298cff4ad59cdca4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
650KB
MD590d1d1de1c00d5055da60384e024f9dc
SHA105ec4f5f6d44f7cdd34dbc9f5fbc2e68bd888452
SHA256ead1f01854e75cf4b71e512169a2f9640c960bc94e22ebdd3a84d287357d18e8
SHA5124a543da8a2608b149cf1996c2007bb0e274fb57390addba5bcdd741e70140dd825ace3d9bc42b409a90cfc8da8bd5c976c9eda890b6414b4a60a64fd3f600307