Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 17:26
Behavioral task
behavioral1
Sample
499ba40374c0ed10e6ce426da9a8c3c3.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
499ba40374c0ed10e6ce426da9a8c3c3.exe
-
Size
784KB
-
MD5
499ba40374c0ed10e6ce426da9a8c3c3
-
SHA1
20514cb11598614ed8091cc3a7070c78d6c75200
-
SHA256
7caa63fbc61a53cafd472153ed007a142b21ef75b78c2b0104b9ea177e3203a9
-
SHA512
8f98f777fb47b35372d3f4917ad2cf96783682e77d7dfa6d4898f6cf1ae7104855764204ffe5fb189af41b1d691ffd0cfee9a50936533dbab02a881f96fb0484
-
SSDEEP
12288:m07+ufSFadQJFuxBkhCJG5c8vmhlnWnCck6X2p5lCvJ1u3oNk5fnlo4QDa:m07QFFkxvfsmh1+L4YN2nl3
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/1272-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2920-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2920-27-0x0000000003120000-0x00000000032B3000-memory.dmp xmrig behavioral1/memory/2920-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2920-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2920-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2920-19-0x0000000000400000-0x0000000000712000-memory.dmp xmrig behavioral1/memory/1272-16-0x00000000031B0000-0x00000000034C2000-memory.dmp xmrig behavioral1/memory/1272-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2920 499ba40374c0ed10e6ce426da9a8c3c3.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 499ba40374c0ed10e6ce426da9a8c3c3.exe -
Loads dropped DLL 1 IoCs
pid Process 1272 499ba40374c0ed10e6ce426da9a8c3c3.exe -
resource yara_rule behavioral1/memory/1272-0-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1272 499ba40374c0ed10e6ce426da9a8c3c3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1272 499ba40374c0ed10e6ce426da9a8c3c3.exe 2920 499ba40374c0ed10e6ce426da9a8c3c3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2920 1272 499ba40374c0ed10e6ce426da9a8c3c3.exe 15 PID 1272 wrote to memory of 2920 1272 499ba40374c0ed10e6ce426da9a8c3c3.exe 15 PID 1272 wrote to memory of 2920 1272 499ba40374c0ed10e6ce426da9a8c3c3.exe 15 PID 1272 wrote to memory of 2920 1272 499ba40374c0ed10e6ce426da9a8c3c3.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\499ba40374c0ed10e6ce426da9a8c3c3.exeC:\Users\Admin\AppData\Local\Temp\499ba40374c0ed10e6ce426da9a8c3c3.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2920
-
C:\Users\Admin\AppData\Local\Temp\499ba40374c0ed10e6ce426da9a8c3c3.exe"C:\Users\Admin\AppData\Local\Temp\499ba40374c0ed10e6ce426da9a8c3c3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1272