Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 19:22
Behavioral task
behavioral1
Sample
a989e1534444b1a47269263ccfea7fb8.exe
Resource
win7-20231215-en
General
-
Target
a989e1534444b1a47269263ccfea7fb8.exe
-
Size
1.6MB
-
MD5
a989e1534444b1a47269263ccfea7fb8
-
SHA1
ff7dbd986073ea14b1bd70a35da682ac6b1c22b9
-
SHA256
edbf287a0e64e1babbcd73ebb31c28665d922d47801f92f577f9d22ca30734b4
-
SHA512
c8e52f014c3d1f00e5c86354d5a3edf9beccfe4dc4a5b1f20302720f9a6f4184b7cecb6cb2d8e0fbac28a363534195f6830fb7bafd90f5e0237c76d81d425c1a
-
SSDEEP
49152:nefECbZPaJVaiuQ/0jGjzA1RwRNK94zLHp8WusnVfQc:ne8CbZPAsizHj8R+zLJgKfd
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/1168-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1168-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4392-25-0x0000000025720000-0x00000000258B3000-memory.dmp xmrig behavioral2/memory/4392-22-0x0000000000400000-0x0000000000582000-memory.dmp xmrig behavioral2/memory/4392-29-0x0000000025A40000-0x0000000025BC2000-memory.dmp xmrig behavioral2/memory/4392-28-0x0000000000400000-0x000000000057C000-memory.dmp xmrig behavioral2/memory/4392-38-0x0000000000400000-0x0000000000A7A000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4392 a989e1534444b1a47269263ccfea7fb8.exe -
Executes dropped EXE 1 IoCs
pid Process 4392 a989e1534444b1a47269263ccfea7fb8.exe -
resource yara_rule behavioral2/memory/1168-0-0x0000000000400000-0x0000000000A7A000-memory.dmp upx behavioral2/memory/4392-14-0x0000000000400000-0x0000000000A7A000-memory.dmp upx behavioral2/files/0x000300000002272c-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1168 a989e1534444b1a47269263ccfea7fb8.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4392 a989e1534444b1a47269263ccfea7fb8.exe Token: SeLockMemoryPrivilege 4392 a989e1534444b1a47269263ccfea7fb8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1168 a989e1534444b1a47269263ccfea7fb8.exe 4392 a989e1534444b1a47269263ccfea7fb8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4392 1168 a989e1534444b1a47269263ccfea7fb8.exe 89 PID 1168 wrote to memory of 4392 1168 a989e1534444b1a47269263ccfea7fb8.exe 89 PID 1168 wrote to memory of 4392 1168 a989e1534444b1a47269263ccfea7fb8.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a989e1534444b1a47269263ccfea7fb8.exe"C:\Users\Admin\AppData\Local\Temp\a989e1534444b1a47269263ccfea7fb8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\a989e1534444b1a47269263ccfea7fb8.exeC:\Users\Admin\AppData\Local\Temp\a989e1534444b1a47269263ccfea7fb8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:4392
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD5f99712775d2349837a9b84fd535e8141
SHA1e85f7978fceb2a08d841acc1cae10f7230973fce
SHA256323f15de8264a7385f70063253abb2d8865c49bde0ecaa106f9754b964959b72
SHA512e0a201e1692fcedb9386226f8f80c14e2313e97ccf3003905c116e6883306172d04b2009c7cc259f5ea6f8a841c14a832e61ee773b1ec71c464ed362afa0a761