Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 13:14
Behavioral task
behavioral1
Sample
4b88cf060aa151ed32bc9c449abe70ad.exe
Resource
win7-20231129-en
General
-
Target
4b88cf060aa151ed32bc9c449abe70ad.exe
-
Size
784KB
-
MD5
4b88cf060aa151ed32bc9c449abe70ad
-
SHA1
3ed07e351d17f2a0174aaa6a01d1a51d47dd396a
-
SHA256
bee199ec2828e591fd5aa03e075eb53d1a7ecbdbd69b30290c72619f14c6fe76
-
SHA512
6f24e597713a5352718aaf26bdb036b6318c8600aff06f8fa542cb923ed42e1500666a78d6ba37db354af7a14cf4b36dea4ff7ac9eb691fdfe6e13f4d2b2f4ad
-
SSDEEP
12288:RYW3WSdXBpAMwhHZ/OM9TFfJlIxttSseAsUjWBeaC2d14e2L7meUob3kCi:RwEXGtxOM9TFJMttSn8WBu2d1R2+mbt
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1632-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1632-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4696-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4696-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4696-21-0x0000000005410000-0x00000000055A3000-memory.dmp xmrig behavioral2/memory/4696-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4696 4b88cf060aa151ed32bc9c449abe70ad.exe -
Executes dropped EXE 1 IoCs
pid Process 4696 4b88cf060aa151ed32bc9c449abe70ad.exe -
resource yara_rule behavioral2/memory/1632-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/4696-13-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000400000001e630-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1632 4b88cf060aa151ed32bc9c449abe70ad.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1632 4b88cf060aa151ed32bc9c449abe70ad.exe 4696 4b88cf060aa151ed32bc9c449abe70ad.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1632 wrote to memory of 4696 1632 4b88cf060aa151ed32bc9c449abe70ad.exe 43 PID 1632 wrote to memory of 4696 1632 4b88cf060aa151ed32bc9c449abe70ad.exe 43 PID 1632 wrote to memory of 4696 1632 4b88cf060aa151ed32bc9c449abe70ad.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b88cf060aa151ed32bc9c449abe70ad.exe"C:\Users\Admin\AppData\Local\Temp\4b88cf060aa151ed32bc9c449abe70ad.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\4b88cf060aa151ed32bc9c449abe70ad.exeC:\Users\Admin\AppData\Local\Temp\4b88cf060aa151ed32bc9c449abe70ad.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4696
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5728bf9a1f089c5eb88d0300b0ffb4277
SHA1a906972f33170594d85ade1905d2d8085be5c8a8
SHA256e2f74f8b8be0760de753a46607d81f28e9da4a732289770a40e196a4ca6c610d
SHA51258b0cb70151decc05cca8f6b0fdfbf3173460ea2cf4ea61d26a6849f4102a6e3165bb97cf516ad5abfd7d8275a5f33f61e2715a2f781fd5d96f26a5d1f4dd7d6