Analysis
-
max time kernel
128s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 10:43
Behavioral task
behavioral1
Sample
72056644ee9864265b50ff2b9a03e6a3.exe
Resource
win7-20231215-en
General
-
Target
72056644ee9864265b50ff2b9a03e6a3.exe
-
Size
784KB
-
MD5
72056644ee9864265b50ff2b9a03e6a3
-
SHA1
fcdd96a51d9dcf59d3f4a32b14c221556247e127
-
SHA256
515676b985fa01a636137c37aaa68bcfd64aef9a6fd45d5df861d56c3634c5a9
-
SHA512
44caece6fa32dc6c72d600d2e9a9684adbaaa97163c3023e16a24ee9ef34c8c43b2769c8e16253969cbdb10edd9a8318ef2559aba9340cabd6df619b77be5119
-
SSDEEP
24576:l5oh/9Z9u1Ze1WbYOeAcArtLqm9um0T/07:roF96ueeAcArtLjUm0T/07
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3016-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3016-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/640-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/640-21-0x0000000005510000-0x00000000056A3000-memory.dmp xmrig behavioral2/memory/640-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/640-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 640 72056644ee9864265b50ff2b9a03e6a3.exe -
Executes dropped EXE 1 IoCs
pid Process 640 72056644ee9864265b50ff2b9a03e6a3.exe -
resource yara_rule behavioral2/memory/3016-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00080000000231ff-11.dat upx behavioral2/memory/640-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3016 72056644ee9864265b50ff2b9a03e6a3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2100 svchost.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3016 72056644ee9864265b50ff2b9a03e6a3.exe 640 72056644ee9864265b50ff2b9a03e6a3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3016 wrote to memory of 640 3016 72056644ee9864265b50ff2b9a03e6a3.exe 90 PID 3016 wrote to memory of 640 3016 72056644ee9864265b50ff2b9a03e6a3.exe 90 PID 3016 wrote to memory of 640 3016 72056644ee9864265b50ff2b9a03e6a3.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\72056644ee9864265b50ff2b9a03e6a3.exe"C:\Users\Admin\AppData\Local\Temp\72056644ee9864265b50ff2b9a03e6a3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\72056644ee9864265b50ff2b9a03e6a3.exeC:\Users\Admin\AppData\Local\Temp\72056644ee9864265b50ff2b9a03e6a3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:640
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2012
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2100
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5d4ab266d0dc9243985d29c1c569a0ee2
SHA1b35ce61de22323ee14562a4e17763b1a607d940d
SHA256b1d9461644fb79d2d09f52b262202d8c2d1896ce2e81d3e32dadb9da50178c9a
SHA512f187df61c3759607db31a70e7ce3ae74fd633b727e4e458c27a792dce30cf35fae7ed2e28d269a7972154a771aea372c1280a351e80e4a2010cd9a96aff28989