Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 03:25
Behavioral task
behavioral1
Sample
7152624a72f18aaa54b9685f8a34d54f.exe
Resource
win7-20231215-en
General
-
Target
7152624a72f18aaa54b9685f8a34d54f.exe
-
Size
784KB
-
MD5
7152624a72f18aaa54b9685f8a34d54f
-
SHA1
90b17ca1576ca947175dfd6f83164ca173a16f6c
-
SHA256
f52022b2c07e9880f78f6b70ad2000622420616f3872262115990bf5b27d644d
-
SHA512
1d2cfdb6b1aeb3a6cbf845327d594d3a7c045d1820edc539c1fc7f9aabcf653f8b59fd69bbc362bfe91a2177f4884a491a24144572ccff3ccbe5fa3ccf148652
-
SSDEEP
24576:PrlQ2S765yExXoV+pd8KTrg9uFZVfZUr6:PrTgCAV+gQtF
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4856-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4856-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1592-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1592-21-0x0000000005480000-0x0000000005613000-memory.dmp xmrig behavioral2/memory/1592-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1592-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1592 7152624a72f18aaa54b9685f8a34d54f.exe -
Executes dropped EXE 1 IoCs
pid Process 1592 7152624a72f18aaa54b9685f8a34d54f.exe -
resource yara_rule behavioral2/memory/4856-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023208-11.dat upx behavioral2/memory/1592-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4856 7152624a72f18aaa54b9685f8a34d54f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4856 7152624a72f18aaa54b9685f8a34d54f.exe 1592 7152624a72f18aaa54b9685f8a34d54f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4856 wrote to memory of 1592 4856 7152624a72f18aaa54b9685f8a34d54f.exe 89 PID 4856 wrote to memory of 1592 4856 7152624a72f18aaa54b9685f8a34d54f.exe 89 PID 4856 wrote to memory of 1592 4856 7152624a72f18aaa54b9685f8a34d54f.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exe"C:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exeC:\Users\Admin\AppData\Local\Temp\7152624a72f18aaa54b9685f8a34d54f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310KB
MD50bc35ba33672e0d6a1a7532cf09e5c3b
SHA1208f03141418e7259ce6d72d09f58734e799da90
SHA2567e6507bce587bd6f0508bf473e8e8120c16523742f21198b36650a968181c71f
SHA51231979b951b2cedf79e72b800c125b501d30179f3d828015467bad95720abcd84095380d6720bc7f0a0fd68b8bbf21bb14c9eb288dc17b8804d3cb02bb8b6585b