Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 09:01
Behavioral task
behavioral1
Sample
4349978d241a830eff1021d52397bcf3.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
4349978d241a830eff1021d52397bcf3.exe
-
Size
784KB
-
MD5
4349978d241a830eff1021d52397bcf3
-
SHA1
75f5dc344c680151f939c7380bcf68c39c95d47b
-
SHA256
03f37f8b20eb13fc503dfdd8a65ded63f0a029fd955249c3701b4cd7cb583070
-
SHA512
799ba040c9984a1c80296600d15eea8a8dfdbf2e05e492148085e36304952a899814998ddad8cc7da68508d1d99f8e65e0e02690004dcbe3c2a1d4295db1c64d
-
SSDEEP
24576:gNWVet4kMFfjMJ4hRVbeZFNKrhlPAdob:ZeSh1hRuNKVlPA6
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2056-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2056-16-0x00000000030F0000-0x0000000003402000-memory.dmp xmrig behavioral1/memory/2056-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1308-25-0x0000000002FE0000-0x0000000003173000-memory.dmp xmrig behavioral1/memory/1308-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1308-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1308-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1308 4349978d241a830eff1021d52397bcf3.exe -
Executes dropped EXE 1 IoCs
pid Process 1308 4349978d241a830eff1021d52397bcf3.exe -
Loads dropped DLL 1 IoCs
pid Process 2056 4349978d241a830eff1021d52397bcf3.exe -
resource yara_rule behavioral1/memory/2056-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/memory/1308-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2056 4349978d241a830eff1021d52397bcf3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2056 4349978d241a830eff1021d52397bcf3.exe 1308 4349978d241a830eff1021d52397bcf3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1308 2056 4349978d241a830eff1021d52397bcf3.exe 29 PID 2056 wrote to memory of 1308 2056 4349978d241a830eff1021d52397bcf3.exe 29 PID 2056 wrote to memory of 1308 2056 4349978d241a830eff1021d52397bcf3.exe 29 PID 2056 wrote to memory of 1308 2056 4349978d241a830eff1021d52397bcf3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4349978d241a830eff1021d52397bcf3.exe"C:\Users\Admin\AppData\Local\Temp\4349978d241a830eff1021d52397bcf3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\4349978d241a830eff1021d52397bcf3.exeC:\Users\Admin\AppData\Local\Temp\4349978d241a830eff1021d52397bcf3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1308
-