Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:43
Behavioral task
behavioral1
Sample
74ff85ae44ab6475c8abf7a36325b6c6.exe
Resource
win7-20231215-en
General
-
Target
74ff85ae44ab6475c8abf7a36325b6c6.exe
-
Size
2.3MB
-
MD5
74ff85ae44ab6475c8abf7a36325b6c6
-
SHA1
38a271a47f3fdc2a526c5b3409963d26a4592aaa
-
SHA256
94937da57f8e0d8bae0b95cefe7919682218ede56838ff691da2c634b2af9757
-
SHA512
6562b89781973628ed84a177c113f6779dd18e19b2125453b4d7f1279234ce6d274909c621378997216e8384d34c5dd510cce694be5008a3ac20dffc54fed66a
-
SSDEEP
49152:nGBgFzrU414Iu2MwjVqL8eWJ24KPQA4bVlAfsmifeaVTpN0E:nGBgj4MjjIBa2nQA4AkmRON0
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/3040-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3040-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3040-14-0x00000000034F0000-0x0000000003802000-memory.dmp xmrig behavioral1/memory/2664-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2664-24-0x0000000003220000-0x00000000033B3000-memory.dmp xmrig behavioral1/memory/2664-25-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2664-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
Processes:
74ff85ae44ab6475c8abf7a36325b6c6.exepid process 2664 74ff85ae44ab6475c8abf7a36325b6c6.exe -
Executes dropped EXE 1 IoCs
Processes:
74ff85ae44ab6475c8abf7a36325b6c6.exepid process 2664 74ff85ae44ab6475c8abf7a36325b6c6.exe -
Loads dropped DLL 1 IoCs
Processes:
74ff85ae44ab6475c8abf7a36325b6c6.exepid process 3040 74ff85ae44ab6475c8abf7a36325b6c6.exe -
Processes:
resource yara_rule behavioral1/memory/3040-0-0x0000000000400000-0x0000000000712000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\74ff85ae44ab6475c8abf7a36325b6c6.exe upx behavioral1/memory/2664-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
74ff85ae44ab6475c8abf7a36325b6c6.exepid process 3040 74ff85ae44ab6475c8abf7a36325b6c6.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
74ff85ae44ab6475c8abf7a36325b6c6.exe74ff85ae44ab6475c8abf7a36325b6c6.exepid process 3040 74ff85ae44ab6475c8abf7a36325b6c6.exe 2664 74ff85ae44ab6475c8abf7a36325b6c6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
74ff85ae44ab6475c8abf7a36325b6c6.exedescription pid process target process PID 3040 wrote to memory of 2664 3040 74ff85ae44ab6475c8abf7a36325b6c6.exe 74ff85ae44ab6475c8abf7a36325b6c6.exe PID 3040 wrote to memory of 2664 3040 74ff85ae44ab6475c8abf7a36325b6c6.exe 74ff85ae44ab6475c8abf7a36325b6c6.exe PID 3040 wrote to memory of 2664 3040 74ff85ae44ab6475c8abf7a36325b6c6.exe 74ff85ae44ab6475c8abf7a36325b6c6.exe PID 3040 wrote to memory of 2664 3040 74ff85ae44ab6475c8abf7a36325b6c6.exe 74ff85ae44ab6475c8abf7a36325b6c6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74ff85ae44ab6475c8abf7a36325b6c6.exe"C:\Users\Admin\AppData\Local\Temp\74ff85ae44ab6475c8abf7a36325b6c6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\74ff85ae44ab6475c8abf7a36325b6c6.exeC:\Users\Admin\AppData\Local\Temp\74ff85ae44ab6475c8abf7a36325b6c6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2664
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5aaa6a4cdf529af4eee5afea8e38d4c8e
SHA12ab37c4c8fc0f166a67eb33c0cf559bbb89eba98
SHA256aa2e41a6f1a85f16cdfac43643c1164c19dee497581adfabc0031746fd931ade
SHA51235c56775fb0dd7add916e5b60a79f920e8cd50cbdb87a99b526c35920624e30a10588bd18dfa219646d76f91f5d8706c8fd56547fe77977007de2eb7abc68e01