Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 03:43
Behavioral task
behavioral1
Sample
73a5070cb2ec4ef6f8cb12db20cdbdfb.exe
Resource
win7-20231129-en
General
-
Target
73a5070cb2ec4ef6f8cb12db20cdbdfb.exe
-
Size
784KB
-
MD5
73a5070cb2ec4ef6f8cb12db20cdbdfb
-
SHA1
12889d5fd63d9c916f0779bfff33afbdb36b1655
-
SHA256
0f66debb813988cb5e0d1875ae6d0bfe1f5e10ac2215457cf0de41c71775cf67
-
SHA512
7f01fedc9c673f1d4dda9a25e94c419fd08cb8bce9d738474273a790844264e21646ea1152e1ff6590679becec890a813e64c63c2b7c0debf44586a4408cb2ca
-
SSDEEP
24576:YlBuLCD+zgM/gLg+w+UrKWKHadPz9DoahiCt8lpG:5L++zNgtUa6dPzhjhiC6
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3620-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3620-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3456-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3456-20-0x0000000005370000-0x0000000005503000-memory.dmp xmrig behavioral2/memory/3456-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3456-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3456 73a5070cb2ec4ef6f8cb12db20cdbdfb.exe -
Executes dropped EXE 1 IoCs
pid Process 3456 73a5070cb2ec4ef6f8cb12db20cdbdfb.exe -
resource yara_rule behavioral2/memory/3620-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0002000000022775-11.dat upx behavioral2/memory/3456-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3620 73a5070cb2ec4ef6f8cb12db20cdbdfb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3620 73a5070cb2ec4ef6f8cb12db20cdbdfb.exe 3456 73a5070cb2ec4ef6f8cb12db20cdbdfb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3620 wrote to memory of 3456 3620 73a5070cb2ec4ef6f8cb12db20cdbdfb.exe 89 PID 3620 wrote to memory of 3456 3620 73a5070cb2ec4ef6f8cb12db20cdbdfb.exe 89 PID 3620 wrote to memory of 3456 3620 73a5070cb2ec4ef6f8cb12db20cdbdfb.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\73a5070cb2ec4ef6f8cb12db20cdbdfb.exe"C:\Users\Admin\AppData\Local\Temp\73a5070cb2ec4ef6f8cb12db20cdbdfb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\73a5070cb2ec4ef6f8cb12db20cdbdfb.exeC:\Users\Admin\AppData\Local\Temp\73a5070cb2ec4ef6f8cb12db20cdbdfb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3456
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5ffe785180c3fd404c3c268547a618c26
SHA1e033edc0215c47c425c6fd946db5fcb88542b3c0
SHA2566bcd838b1828488eacc63858294a6465c772d8884d8c180224a280283018990b
SHA512a08d4dcbd5b04e6d09a2754f95c9c06693982030789d268bfb0fe496ab0239a60b23bf63a24a441ba9d0523a2d2cba4c3f4bc8940ebf4a53a25965c0ac88be58