Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:29
Behavioral task
behavioral1
Sample
39dc9ad769d1be292efd2f3400c49669.exe
Resource
win7-20231215-en
General
-
Target
39dc9ad769d1be292efd2f3400c49669.exe
-
Size
784KB
-
MD5
39dc9ad769d1be292efd2f3400c49669
-
SHA1
407171f0f2d32ec861fa23d29e2b9b8ffe4cd646
-
SHA256
97bd130856eea367f0fb8548f0ac19694cfa9d737dc059614ab6236469757d74
-
SHA512
6f65a459f5544621c850cf231a933c2a587a201b28c66897ed4b7f8dc81983e8812671e95c42e0371919d218139337137b120b63b058c33d6a597358dfc32ddd
-
SSDEEP
24576:xK7yldNitoINTd6V9jCZ4cP8AzY2CAQnrCS4:xK7K/t8A+4aAAg54
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/2652-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2652-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1816-26-0x0000000003220000-0x00000000033B3000-memory.dmp xmrig behavioral1/memory/1816-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1816-33-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1816-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1816 39dc9ad769d1be292efd2f3400c49669.exe -
Executes dropped EXE 1 IoCs
pid Process 1816 39dc9ad769d1be292efd2f3400c49669.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 39dc9ad769d1be292efd2f3400c49669.exe -
resource yara_rule behavioral1/memory/2652-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/memory/1816-16-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000c00000001233b-14.dat upx behavioral1/files/0x000c00000001233b-13.dat upx behavioral1/files/0x000c00000001233b-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2652 39dc9ad769d1be292efd2f3400c49669.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2652 39dc9ad769d1be292efd2f3400c49669.exe 1816 39dc9ad769d1be292efd2f3400c49669.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1816 2652 39dc9ad769d1be292efd2f3400c49669.exe 29 PID 2652 wrote to memory of 1816 2652 39dc9ad769d1be292efd2f3400c49669.exe 29 PID 2652 wrote to memory of 1816 2652 39dc9ad769d1be292efd2f3400c49669.exe 29 PID 2652 wrote to memory of 1816 2652 39dc9ad769d1be292efd2f3400c49669.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\39dc9ad769d1be292efd2f3400c49669.exe"C:\Users\Admin\AppData\Local\Temp\39dc9ad769d1be292efd2f3400c49669.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\39dc9ad769d1be292efd2f3400c49669.exeC:\Users\Admin\AppData\Local\Temp\39dc9ad769d1be292efd2f3400c49669.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1816
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD506063eb93d548b1096f4c3778a9f1781
SHA145fe5aaf533b71a18d80f6f8f53b27b16b5d6c4e
SHA256ceab87e25078ccdd5871c3a75a8ebb588348c5df1daa5a71d302abb0f2def208
SHA51227c6f5fb74f00dfcd7806bb6e923301510ec09d3e8e94ad530fc7f5c679cb7ba03df1fc2195d38d8d371f062df9c2a892857f377c526cc842478dfaf5c558b7b
-
Filesize
381KB
MD50e7acd178240b913be37414303274c7f
SHA1fb99eca010c12f25a4b2c92dc82bd5320cf61837
SHA2565502ca57d7faf5e344c6c255b6749d103fa6b9d8e699b06de95b5728e52427c5
SHA512aebc01d58697fee4ab09393662e32eb0646f272507d0d3e5b0beb94e2f29ef8eb1651c5757150578504744abff28a66b37da6ef5fe4f6e9f360f808a22a65500