Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 03:25
Behavioral task
behavioral1
Sample
7152624a72f18aaa54b9685f8a34d54f.exe
Resource
win7-20231215-en
General
-
Target
7152624a72f18aaa54b9685f8a34d54f.exe
-
Size
784KB
-
MD5
7152624a72f18aaa54b9685f8a34d54f
-
SHA1
90b17ca1576ca947175dfd6f83164ca173a16f6c
-
SHA256
f52022b2c07e9880f78f6b70ad2000622420616f3872262115990bf5b27d644d
-
SHA512
1d2cfdb6b1aeb3a6cbf845327d594d3a7c045d1820edc539c1fc7f9aabcf653f8b59fd69bbc362bfe91a2177f4884a491a24144572ccff3ccbe5fa3ccf148652
-
SSDEEP
24576:PrlQ2S765yExXoV+pd8KTrg9uFZVfZUr6:PrTgCAV+gQtF
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2216-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2216-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2352-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2352-24-0x0000000003070000-0x0000000003203000-memory.dmp xmrig behavioral1/memory/2352-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2352-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2352-33-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2352 7152624a72f18aaa54b9685f8a34d54f.exe -
Executes dropped EXE 1 IoCs
pid Process 2352 7152624a72f18aaa54b9685f8a34d54f.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 7152624a72f18aaa54b9685f8a34d54f.exe -
resource yara_rule behavioral1/memory/2216-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000b000000012274-10.dat upx behavioral1/memory/2352-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2216 7152624a72f18aaa54b9685f8a34d54f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2216 7152624a72f18aaa54b9685f8a34d54f.exe 2352 7152624a72f18aaa54b9685f8a34d54f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2352 2216 7152624a72f18aaa54b9685f8a34d54f.exe 29 PID 2216 wrote to memory of 2352 2216 7152624a72f18aaa54b9685f8a34d54f.exe 29 PID 2216 wrote to memory of 2352 2216 7152624a72f18aaa54b9685f8a34d54f.exe 29 PID 2216 wrote to memory of 2352 2216 7152624a72f18aaa54b9685f8a34d54f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exe"C:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exeC:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2352
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5af6b6bc952415165108e9c332aa69010
SHA1388ac4cb57e305c6173feef59b321bfef4b12962
SHA25660a3acd4ba444e3fa71e0696db0577f95c6992a5a61eda3da0f6a6c692a83ab4
SHA5128935d30b73650c8ad3a64037f9d3e27d365e6d3b99dd1c6967de5558127fb9cbac7a7378a10457ce7a25e1dfe96bdb1c56decf335d97abf3dfa3b8283e541361