Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:43
Behavioral task
behavioral1
Sample
24eadc1a34c0600cef801e53d55401b9.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
24eadc1a34c0600cef801e53d55401b9.exe
-
Size
784KB
-
MD5
24eadc1a34c0600cef801e53d55401b9
-
SHA1
ba761eaa01d563b8d5fc92cbd3b431f1ab224a58
-
SHA256
931440df134a9dd6e325396e061c5696b4041bffb599113e62ad0605626ac74a
-
SHA512
0eb7062c5b94b817c22cf6fa7f42788a145da693bcae9c4c0687138d7ea9053025ac16887946c58984d0375da3d618c626b014cecc1207666bc84b1022ddb5ef
-
SSDEEP
24576:WI7ZjBIio1xzMbfl23r/cHC+6TEGnDbU:fR+R1xzMc7ciLEGH
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3324-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4740-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3324-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4740-21-0x00000000053E0000-0x0000000005573000-memory.dmp xmrig behavioral2/memory/4740-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4740-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4740 24eadc1a34c0600cef801e53d55401b9.exe -
Executes dropped EXE 1 IoCs
pid Process 4740 24eadc1a34c0600cef801e53d55401b9.exe -
resource yara_rule behavioral2/memory/3324-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/4740-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3324 24eadc1a34c0600cef801e53d55401b9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3324 24eadc1a34c0600cef801e53d55401b9.exe 4740 24eadc1a34c0600cef801e53d55401b9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3324 wrote to memory of 4740 3324 24eadc1a34c0600cef801e53d55401b9.exe 92 PID 3324 wrote to memory of 4740 3324 24eadc1a34c0600cef801e53d55401b9.exe 92 PID 3324 wrote to memory of 4740 3324 24eadc1a34c0600cef801e53d55401b9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\24eadc1a34c0600cef801e53d55401b9.exe"C:\Users\Admin\AppData\Local\Temp\24eadc1a34c0600cef801e53d55401b9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\24eadc1a34c0600cef801e53d55401b9.exeC:\Users\Admin\AppData\Local\Temp\24eadc1a34c0600cef801e53d55401b9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4740
-