Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 18:45
Behavioral task
behavioral1
Sample
4e1d2b126c5deb44790ab1d54ecfb956.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
General
-
Target
4e1d2b126c5deb44790ab1d54ecfb956.exe
-
Size
784KB
-
MD5
4e1d2b126c5deb44790ab1d54ecfb956
-
SHA1
e50d48f785eeffe1e03292d41e210632eec6902c
-
SHA256
6736ff469899cf082bfb5fe4a87881a66776555afc4e000fd96d83d93dfc1ddd
-
SHA512
38f814c61a2214f266be9161b88beaf649229bd5996393df8b530f8c72c34a6bb6e19b3295e237fa6c01caca79e15dcf8f98b76be34a706e9dd5a074faebe761
-
SSDEEP
12288:+HdTyucP4SQfdyed90fbM+/e1MR3UsuHqRFV5ZACHmBKM+68jK9Hs2KVhE:iGucARkBMge1YUsucVDmEVjd1V
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/1568-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1568-17-0x00000000030E0000-0x00000000033F2000-memory.dmp xmrig behavioral1/memory/2144-25-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2144-28-0x00000000030B0000-0x0000000003243000-memory.dmp xmrig behavioral1/memory/2144-36-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2144-35-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2144-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1568-16-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2144 4e1d2b126c5deb44790ab1d54ecfb956.exe -
Executes dropped EXE 1 IoCs
pid Process 2144 4e1d2b126c5deb44790ab1d54ecfb956.exe -
Loads dropped DLL 1 IoCs
pid Process 1568 4e1d2b126c5deb44790ab1d54ecfb956.exe -
resource yara_rule behavioral1/memory/1568-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/memory/2144-18-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x00070000000122c9-15.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1568 4e1d2b126c5deb44790ab1d54ecfb956.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1568 4e1d2b126c5deb44790ab1d54ecfb956.exe 2144 4e1d2b126c5deb44790ab1d54ecfb956.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2144 1568 4e1d2b126c5deb44790ab1d54ecfb956.exe 17 PID 1568 wrote to memory of 2144 1568 4e1d2b126c5deb44790ab1d54ecfb956.exe 17 PID 1568 wrote to memory of 2144 1568 4e1d2b126c5deb44790ab1d54ecfb956.exe 17 PID 1568 wrote to memory of 2144 1568 4e1d2b126c5deb44790ab1d54ecfb956.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e1d2b126c5deb44790ab1d54ecfb956.exe"C:\Users\Admin\AppData\Local\Temp\4e1d2b126c5deb44790ab1d54ecfb956.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\4e1d2b126c5deb44790ab1d54ecfb956.exeC:\Users\Admin\AppData\Local\Temp\4e1d2b126c5deb44790ab1d54ecfb956.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2144
-