Analysis
-
max time kernel
140s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 03:13
Behavioral task
behavioral1
Sample
3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
General
-
Target
3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe
-
Size
784KB
-
MD5
3bbde03c956e9fc60dcdc0e0bc6a5dc2
-
SHA1
b334f17ed79d72d59f8d65a575ba5a1abe94c253
-
SHA256
1355bf55cfd8d2447ef2674380e8142b2b8469faf33d18885e67e8944afcf0b1
-
SHA512
51f668dcdf325127316a937f5a86a826bc3e77c7d5979c5de5f560603981bba8fe1ce42715cef6151cbffcc3e6a9b35a47ba40281d0f0c36b21df227e20c2d96
-
SSDEEP
24576:MIXV76DwhhsuJXaberVoD07TqBnDPoL7K17e3wK:MIXVGk7s2XaCWI7TqBnCXw
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3964-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3964-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/112-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/112-20-0x00000000053B0000-0x0000000005543000-memory.dmp xmrig behavioral2/memory/112-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/112-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 112 3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe -
Executes dropped EXE 1 IoCs
pid Process 112 3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe -
resource yara_rule behavioral2/memory/3964-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/112-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3964 3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3964 3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe 112 3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3964 wrote to memory of 112 3964 3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe 23 PID 3964 wrote to memory of 112 3964 3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe 23 PID 3964 wrote to memory of 112 3964 3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe"C:\Users\Admin\AppData\Local\Temp\3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\3bbde03c956e9fc60dcdc0e0bc6a5dc2.exeC:\Users\Admin\AppData\Local\Temp\3bbde03c956e9fc60dcdc0e0bc6a5dc2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:112
-