Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:09
Behavioral task
behavioral1
Sample
23ff125afa8752e7ff08a97c65691d71.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
General
-
Target
23ff125afa8752e7ff08a97c65691d71.exe
-
Size
784KB
-
MD5
23ff125afa8752e7ff08a97c65691d71
-
SHA1
a0e170af076082f6b1fbb29d203f8965f4585af9
-
SHA256
4e3017ac9821e866d97115d603ccdf8e672d26ccda5f6b2ecb7314e6379b6c18
-
SHA512
383345270a4b452fea53f9b23fc46f04fa55f2d4123f9255f0f313a77144f47ef7202c0ac509e8cab34c2d74f5846a51ca9cf78e1cfc6bf893fa8185e69ed46d
-
SSDEEP
24576:+TJ7b5f8oE/U5zgReC6C2BnHAdOgdeC/M:+d7df8oZ5ueC4BnHYde
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4272-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4248-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4248-21-0x0000000005450000-0x00000000055E3000-memory.dmp xmrig behavioral2/memory/4248-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4248-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4272-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4248 23ff125afa8752e7ff08a97c65691d71.exe -
Executes dropped EXE 1 IoCs
pid Process 4248 23ff125afa8752e7ff08a97c65691d71.exe -
resource yara_rule behavioral2/memory/4272-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/4248-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4272 23ff125afa8752e7ff08a97c65691d71.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4272 23ff125afa8752e7ff08a97c65691d71.exe 4248 23ff125afa8752e7ff08a97c65691d71.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4272 wrote to memory of 4248 4272 23ff125afa8752e7ff08a97c65691d71.exe 21 PID 4272 wrote to memory of 4248 4272 23ff125afa8752e7ff08a97c65691d71.exe 21 PID 4272 wrote to memory of 4248 4272 23ff125afa8752e7ff08a97c65691d71.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\23ff125afa8752e7ff08a97c65691d71.exe"C:\Users\Admin\AppData\Local\Temp\23ff125afa8752e7ff08a97c65691d71.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\23ff125afa8752e7ff08a97c65691d71.exeC:\Users\Admin\AppData\Local\Temp\23ff125afa8752e7ff08a97c65691d71.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4248
-