Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 04:05
Behavioral task
behavioral1
Sample
527cbc7e24523b17f079cb928f82a005.exe
Resource
win7-20231129-en
9 signatures
150 seconds
General
-
Target
527cbc7e24523b17f079cb928f82a005.exe
-
Size
784KB
-
MD5
527cbc7e24523b17f079cb928f82a005
-
SHA1
164c5f4e99904c805dc55fabe8f4f2a3416b7631
-
SHA256
3cf32d6bddc76d92192038c1018ac76f692a7db02d42227b04658c4e27a1e73a
-
SHA512
c484a42ac7b65b6fe8e1afe4f2fcd2eab4673260b9e2768832c154ea995ec5eed74f8388273f1d83c9232b1a71486b3f816393c17f097847e53bcbe5931b463e
-
SSDEEP
24576:hN5Yd0uhM3Snm32OmYW+Wju8QylHik7mvCNJPSW:h8d0onVOT4jnlCk7mqf
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/1548-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1548-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/764-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/764-21-0x0000000005330000-0x00000000054C3000-memory.dmp xmrig behavioral2/memory/764-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/764-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/764-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 764 527cbc7e24523b17f079cb928f82a005.exe -
Executes dropped EXE 1 IoCs
pid Process 764 527cbc7e24523b17f079cb928f82a005.exe -
resource yara_rule behavioral2/memory/1548-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023210-11.dat upx behavioral2/memory/764-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1548 527cbc7e24523b17f079cb928f82a005.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1548 527cbc7e24523b17f079cb928f82a005.exe 764 527cbc7e24523b17f079cb928f82a005.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1548 wrote to memory of 764 1548 527cbc7e24523b17f079cb928f82a005.exe 90 PID 1548 wrote to memory of 764 1548 527cbc7e24523b17f079cb928f82a005.exe 90 PID 1548 wrote to memory of 764 1548 527cbc7e24523b17f079cb928f82a005.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\527cbc7e24523b17f079cb928f82a005.exe"C:\Users\Admin\AppData\Local\Temp\527cbc7e24523b17f079cb928f82a005.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\527cbc7e24523b17f079cb928f82a005.exeC:\Users\Admin\AppData\Local\Temp\527cbc7e24523b17f079cb928f82a005.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:764
-