Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 01:37
Behavioral task
behavioral1
Sample
51a9a75f25908da04e103544853a31b9.exe
Resource
win7-20231129-en
windows7-x64
9 signatures
150 seconds
General
-
Target
51a9a75f25908da04e103544853a31b9.exe
-
Size
784KB
-
MD5
51a9a75f25908da04e103544853a31b9
-
SHA1
bd6f59741ad73d35d1b3e7c72cc442250438c699
-
SHA256
936bd6fe68ab197ec2532172609c42906135dce4ed2a9c00534753256befd43d
-
SHA512
dcc5c321819bc00f26aba376f2ce45a84f3b51f85aed80957560131a065213de5e659c984b523ecfbbbafdb40c84920ed333d7005a774116c06abf3db73bc325
-
SSDEEP
12288:T0Q9RGgdQSTpFCH+sAk1fxBi6O28Vq9yBQ+CvkAscJKw1Q/h0MW:XH7dQ+39vAA/A9yJrAbJ+/h/
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/640-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2328-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2328-19-0x0000000000400000-0x0000000000712000-memory.dmp xmrig behavioral1/memory/2328-26-0x0000000003290000-0x0000000003423000-memory.dmp xmrig behavioral1/memory/2328-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2328-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/640-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2328 51a9a75f25908da04e103544853a31b9.exe -
Executes dropped EXE 1 IoCs
pid Process 2328 51a9a75f25908da04e103544853a31b9.exe -
Loads dropped DLL 1 IoCs
pid Process 640 51a9a75f25908da04e103544853a31b9.exe -
resource yara_rule behavioral1/memory/640-0-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 640 51a9a75f25908da04e103544853a31b9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 640 51a9a75f25908da04e103544853a31b9.exe 2328 51a9a75f25908da04e103544853a31b9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 640 wrote to memory of 2328 640 51a9a75f25908da04e103544853a31b9.exe 15 PID 640 wrote to memory of 2328 640 51a9a75f25908da04e103544853a31b9.exe 15 PID 640 wrote to memory of 2328 640 51a9a75f25908da04e103544853a31b9.exe 15 PID 640 wrote to memory of 2328 640 51a9a75f25908da04e103544853a31b9.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\51a9a75f25908da04e103544853a31b9.exeC:\Users\Admin\AppData\Local\Temp\51a9a75f25908da04e103544853a31b9.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2328
-
C:\Users\Admin\AppData\Local\Temp\51a9a75f25908da04e103544853a31b9.exe"C:\Users\Admin\AppData\Local\Temp\51a9a75f25908da04e103544853a31b9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:640