Analysis
-
max time kernel
148s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 05:21
Behavioral task
behavioral1
Sample
4d7210f3e265f53dc5384dbeca5676bf.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
4d7210f3e265f53dc5384dbeca5676bf.exe
-
Size
784KB
-
MD5
4d7210f3e265f53dc5384dbeca5676bf
-
SHA1
0dc85fd3dbf974245e0892ace4a488d6e949d003
-
SHA256
cfc2731b25f05066ce9e860b19c82f62f8e09e82dc312e7e08d77a2184c03665
-
SHA512
e53034ff89b0e802a12439e8268c2a7284e412525f96327ed692d8f111114d1307f767f37cee7dfd0a5407b06bb5c298528ff490d98abba3914dfb9e591fab88
-
SSDEEP
24576:QjU7G4Jsu4EnT8Fa18ivc+ZrbUverkiYOTJwvoQhG3OHN:esyu481dv5E2rlYgJwvO3oN
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1784-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1976-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1976-22-0x0000000005400000-0x0000000005593000-memory.dmp xmrig behavioral2/memory/1976-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1976-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1784-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1976 4d7210f3e265f53dc5384dbeca5676bf.exe -
Executes dropped EXE 1 IoCs
pid Process 1976 4d7210f3e265f53dc5384dbeca5676bf.exe -
resource yara_rule behavioral2/memory/1784-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/1976-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1784 4d7210f3e265f53dc5384dbeca5676bf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1784 4d7210f3e265f53dc5384dbeca5676bf.exe 1976 4d7210f3e265f53dc5384dbeca5676bf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1784 wrote to memory of 1976 1784 4d7210f3e265f53dc5384dbeca5676bf.exe 19 PID 1784 wrote to memory of 1976 1784 4d7210f3e265f53dc5384dbeca5676bf.exe 19 PID 1784 wrote to memory of 1976 1784 4d7210f3e265f53dc5384dbeca5676bf.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d7210f3e265f53dc5384dbeca5676bf.exe"C:\Users\Admin\AppData\Local\Temp\4d7210f3e265f53dc5384dbeca5676bf.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\4d7210f3e265f53dc5384dbeca5676bf.exeC:\Users\Admin\AppData\Local\Temp\4d7210f3e265f53dc5384dbeca5676bf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1976
-