Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 17:02
Behavioral task
behavioral1
Sample
593ed3f252eab4c5002005ad61bcc4c8.exe
Resource
win7-20231129-en
General
-
Target
593ed3f252eab4c5002005ad61bcc4c8.exe
-
Size
784KB
-
MD5
593ed3f252eab4c5002005ad61bcc4c8
-
SHA1
29493af4e5e597b640d9e216b596b32159a4fd2a
-
SHA256
868165f128b393013515f9275877c971110736907fbc7657d5bc267315367c41
-
SHA512
dfb5cd816a973f9272b8651866342d74032b574be8f712495fb3060089a6c03b139f3f56edc4694c50e624fa17e7027fe193e7047049f7ae4c031c977f5ccc1c
-
SSDEEP
12288:57IR/sOTQSel5AZF1I2h97O7HtV7dWUzvtY1X6ybc1LVkyArbeCSDtanLVyqERh:57IZySW+ZMg5kFWURoXsQrb5SDt0oV3
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4920-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1336-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1336-21-0x0000000005410000-0x00000000055A3000-memory.dmp xmrig behavioral2/memory/1336-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4920-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1336-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1336 593ed3f252eab4c5002005ad61bcc4c8.exe -
Executes dropped EXE 1 IoCs
pid Process 1336 593ed3f252eab4c5002005ad61bcc4c8.exe -
resource yara_rule behavioral2/memory/4920-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00070000000231ea-11.dat upx behavioral2/memory/1336-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4920 593ed3f252eab4c5002005ad61bcc4c8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4920 593ed3f252eab4c5002005ad61bcc4c8.exe 1336 593ed3f252eab4c5002005ad61bcc4c8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 1336 4920 593ed3f252eab4c5002005ad61bcc4c8.exe 21 PID 4920 wrote to memory of 1336 4920 593ed3f252eab4c5002005ad61bcc4c8.exe 21 PID 4920 wrote to memory of 1336 4920 593ed3f252eab4c5002005ad61bcc4c8.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\593ed3f252eab4c5002005ad61bcc4c8.exe"C:\Users\Admin\AppData\Local\Temp\593ed3f252eab4c5002005ad61bcc4c8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\593ed3f252eab4c5002005ad61bcc4c8.exeC:\Users\Admin\AppData\Local\Temp\593ed3f252eab4c5002005ad61bcc4c8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1336
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5f86e83b156c199cc589160fab5d734e5
SHA14a992e2de4c741a5c6247c335138d6a3018d4b31
SHA256af85f5e27abf4db14f2121d371d67add01afa69e26d0e36f814cb644f37332a2
SHA512859f47da0830c129f03675406b4b6efaf036b2345dcbbdf0c1d6f41b715918a40409bba0bf5231a2e1871ccbcccaf0d06037e204bf09ae68b4b7ff770b355f35