Analysis
-
max time kernel
123s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:13
Behavioral task
behavioral1
Sample
27b6472d92855c2fe6452e1f5a85bb4d.exe
Resource
win7-20231215-en
General
-
Target
27b6472d92855c2fe6452e1f5a85bb4d.exe
-
Size
784KB
-
MD5
27b6472d92855c2fe6452e1f5a85bb4d
-
SHA1
55aa9bde0eb77ee08c0e8655fb839ac0e284289c
-
SHA256
d75d8dc21d766af45d4843dfeb5c04871b96f05b0f44c8add5c26f8077d1b04d
-
SHA512
6b1ad7832b46c07cd100c3ee7c762d32fa7d90649f72a1c32b4db1ee6bc56356697a703586f48c5fc9a094ac07c05d03aa4114d44b1fca4c9a63236ff54b32c1
-
SSDEEP
12288:EArllIw7vpm1dKFNfAWoyKnV0v2sKJlQ+oz2Us56ns0R3QtqjcONqaAh0jWT:TlIw7i2NIW6VAalcpQ6+tEzNdCx
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/2820-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2820-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2864-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2864-20-0x0000000005410000-0x00000000055A3000-memory.dmp xmrig behavioral2/memory/2864-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2864-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2864 27b6472d92855c2fe6452e1f5a85bb4d.exe -
Executes dropped EXE 1 IoCs
pid Process 2864 27b6472d92855c2fe6452e1f5a85bb4d.exe -
resource yara_rule behavioral2/memory/2820-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/2864-13-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0006000000023219-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2820 27b6472d92855c2fe6452e1f5a85bb4d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2820 27b6472d92855c2fe6452e1f5a85bb4d.exe 2864 27b6472d92855c2fe6452e1f5a85bb4d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2864 2820 27b6472d92855c2fe6452e1f5a85bb4d.exe 91 PID 2820 wrote to memory of 2864 2820 27b6472d92855c2fe6452e1f5a85bb4d.exe 91 PID 2820 wrote to memory of 2864 2820 27b6472d92855c2fe6452e1f5a85bb4d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\27b6472d92855c2fe6452e1f5a85bb4d.exe"C:\Users\Admin\AppData\Local\Temp\27b6472d92855c2fe6452e1f5a85bb4d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\27b6472d92855c2fe6452e1f5a85bb4d.exeC:\Users\Admin\AppData\Local\Temp\27b6472d92855c2fe6452e1f5a85bb4d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2864
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f36c6e4d55a4f131ce50b7949f807fd7
SHA17f86e67cd95a46a4a0bcd6130a8bc9a789484551
SHA25641c2b98c6357d294e447a603c4eb4cb4b50fea18ee3a6253c4b5a8c7af91b807
SHA51295b58c3d26adb9135f735ab79c69d2ea64634e6d2d5f3470a5cca3fb7bcf99a619af0e144e04b523d06b5b524cc0ced7b72ed2011ecbc60fabc3dfa3f4f77284