Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 15:46
Behavioral task
behavioral1
Sample
50f92f54fa688a579c1dc5c9640ebd4d.exe
Resource
win7-20231215-en
General
-
Target
50f92f54fa688a579c1dc5c9640ebd4d.exe
-
Size
1.5MB
-
MD5
50f92f54fa688a579c1dc5c9640ebd4d
-
SHA1
7ce9527e645f32ff08eac5a179e2dd6fe92be5c2
-
SHA256
2e81ef25655f36179eb8ea6963ea6fb23837dc6eb9209604b8fb9676ed0d08ed
-
SHA512
b76d22baf2dcd494376eacb187e2e23d0ace36e3fe84a54fa3d87e50a24e6eb66e847918a4a327f1962547077fe34fb1a7070a53a1e4ef7dac57076ca8b8564e
-
SSDEEP
24576:AUAvEteJC0sprf70xHgGCdmN02INiwYqbQZH0y8IVZJ2QdRo2I/A6Zj8LtVbnY6g:AUAvLCHzqHgG/MYqdXysEk/d0B
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/1696-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2956-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2956-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2956-26-0x0000000003020000-0x00000000031B3000-memory.dmp xmrig behavioral1/memory/2956-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2956-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/1696-15-0x00000000033C0000-0x00000000036D2000-memory.dmp xmrig behavioral1/memory/1696-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2956 50f92f54fa688a579c1dc5c9640ebd4d.exe -
Executes dropped EXE 1 IoCs
pid Process 2956 50f92f54fa688a579c1dc5c9640ebd4d.exe -
Loads dropped DLL 1 IoCs
pid Process 1696 50f92f54fa688a579c1dc5c9640ebd4d.exe -
resource yara_rule behavioral1/memory/1696-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x00070000000122c4-10.dat upx behavioral1/memory/2956-17-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x00070000000122c4-16.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1696 50f92f54fa688a579c1dc5c9640ebd4d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1696 50f92f54fa688a579c1dc5c9640ebd4d.exe 2956 50f92f54fa688a579c1dc5c9640ebd4d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2956 1696 50f92f54fa688a579c1dc5c9640ebd4d.exe 29 PID 1696 wrote to memory of 2956 1696 50f92f54fa688a579c1dc5c9640ebd4d.exe 29 PID 1696 wrote to memory of 2956 1696 50f92f54fa688a579c1dc5c9640ebd4d.exe 29 PID 1696 wrote to memory of 2956 1696 50f92f54fa688a579c1dc5c9640ebd4d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\50f92f54fa688a579c1dc5c9640ebd4d.exe"C:\Users\Admin\AppData\Local\Temp\50f92f54fa688a579c1dc5c9640ebd4d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\50f92f54fa688a579c1dc5c9640ebd4d.exeC:\Users\Admin\AppData\Local\Temp\50f92f54fa688a579c1dc5c9640ebd4d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD50895113e3222ecd2a6c37dd2a8cf6c7e
SHA1e240654822b0cb586f20e2c9c51aee7424205293
SHA2564398ecb13959eea21e40576d276ff3affc010db8eb5b4ddf06111fd736f1f1bc
SHA51267ddaecf58c58aa5b72be274bac11fec9ec5ca0eeac34f276602faf0e3a00d6a02054d59fe105a9716026649fa379e41ba538a862f6fc7b3bf1e2763453b566b
-
Filesize
784KB
MD5fd2ce18741eb38dff99f07cdc4825a10
SHA1bc5c4267e80474773e486d1b920424875faa8ed1
SHA2564bdf26763ad1d1a13d81687421ca530fdebf2a16b6951535a4e199fa93313568
SHA5129768bf183fc618c64d3f102f98141d8d6bde9e24190c4e279e549e0b5a58bb077f1d22acffbe3a05c49ccda820a0e46966d445a4cf4f0b6bb031102eba1cafbe