Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:29
Behavioral task
behavioral1
Sample
283019e3b6a05e02374d815d85e39a08.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
General
-
Target
283019e3b6a05e02374d815d85e39a08.exe
-
Size
784KB
-
MD5
283019e3b6a05e02374d815d85e39a08
-
SHA1
79fa3abf7713e7559a687a54dda3498d565ed77d
-
SHA256
5965844b40f536a7ef45f0d22399f362e56efb58ce6fdc3e913511475f46a955
-
SHA512
472edc8f642fd25e10246e014b420ba6f66049f54ed37be4e8459cc7ba8c58a4bcb7c1927013ac1a5612c694b2c5737d1108c5b8b4c7992b1f5073b82644c1ad
-
SSDEEP
24576:MCXzdrmJqtF2p1x/B8kX9pGRr3UHVFxZ:M8tmK2p1YEp4kHXxZ
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/1868-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1868-16-0x00000000030F0000-0x0000000003402000-memory.dmp xmrig behavioral1/memory/1868-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2400-24-0x0000000002FE0000-0x0000000003173000-memory.dmp xmrig behavioral1/memory/2400-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2400-25-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2400-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2400-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2400 283019e3b6a05e02374d815d85e39a08.exe -
Executes dropped EXE 1 IoCs
pid Process 2400 283019e3b6a05e02374d815d85e39a08.exe -
Loads dropped DLL 1 IoCs
pid Process 1868 283019e3b6a05e02374d815d85e39a08.exe -
resource yara_rule behavioral1/memory/1868-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/memory/2400-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1868 283019e3b6a05e02374d815d85e39a08.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1868 283019e3b6a05e02374d815d85e39a08.exe 2400 283019e3b6a05e02374d815d85e39a08.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2400 1868 283019e3b6a05e02374d815d85e39a08.exe 21 PID 1868 wrote to memory of 2400 1868 283019e3b6a05e02374d815d85e39a08.exe 21 PID 1868 wrote to memory of 2400 1868 283019e3b6a05e02374d815d85e39a08.exe 21 PID 1868 wrote to memory of 2400 1868 283019e3b6a05e02374d815d85e39a08.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\283019e3b6a05e02374d815d85e39a08.exe"C:\Users\Admin\AppData\Local\Temp\283019e3b6a05e02374d815d85e39a08.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\283019e3b6a05e02374d815d85e39a08.exeC:\Users\Admin\AppData\Local\Temp\283019e3b6a05e02374d815d85e39a08.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2400
-