Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 03:25

General

  • Target

    7152624a72f18aaa54b9685f8a34d54f.exe

  • Size

    784KB

  • MD5

    7152624a72f18aaa54b9685f8a34d54f

  • SHA1

    90b17ca1576ca947175dfd6f83164ca173a16f6c

  • SHA256

    f52022b2c07e9880f78f6b70ad2000622420616f3872262115990bf5b27d644d

  • SHA512

    1d2cfdb6b1aeb3a6cbf845327d594d3a7c045d1820edc539c1fc7f9aabcf653f8b59fd69bbc362bfe91a2177f4884a491a24144572ccff3ccbe5fa3ccf148652

  • SSDEEP

    24576:PrlQ2S765yExXoV+pd8KTrg9uFZVfZUr6:PrTgCAV+gQtF

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 7 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exe
    "C:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exe
      C:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2352

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exe

          Filesize

          784KB

          MD5

          af6b6bc952415165108e9c332aa69010

          SHA1

          388ac4cb57e305c6173feef59b321bfef4b12962

          SHA256

          60a3acd4ba444e3fa71e0696db0577f95c6992a5a61eda3da0f6a6c692a83ab4

          SHA512

          8935d30b73650c8ad3a64037f9d3e27d365e6d3b99dd1c6967de5558127fb9cbac7a7378a10457ce7a25e1dfe96bdb1c56decf335d97abf3dfa3b8283e541361

        • memory/2216-0-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB

        • memory/2216-2-0x0000000000120000-0x00000000001E4000-memory.dmp

          Filesize

          784KB

        • memory/2216-1-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB

        • memory/2216-15-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB

        • memory/2352-16-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB

        • memory/2352-18-0x0000000001720000-0x00000000017E4000-memory.dmp

          Filesize

          784KB

        • memory/2352-17-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB

        • memory/2352-24-0x0000000003070000-0x0000000003203000-memory.dmp

          Filesize

          1.6MB

        • memory/2352-23-0x0000000000400000-0x0000000000587000-memory.dmp

          Filesize

          1.5MB

        • memory/2352-34-0x0000000000400000-0x0000000000587000-memory.dmp

          Filesize

          1.5MB

        • memory/2352-33-0x00000000005A0000-0x000000000071F000-memory.dmp

          Filesize

          1.5MB