Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 22:37
Behavioral task
behavioral1
Sample
8d883d66570955cc4b468022f5fc8a1a.exe
Resource
win7-20231215-en
General
-
Target
8d883d66570955cc4b468022f5fc8a1a.exe
-
Size
784KB
-
MD5
8d883d66570955cc4b468022f5fc8a1a
-
SHA1
b7363d584711da99f9346c17ae70db47d0ed766e
-
SHA256
e1fa0432dc09d323a3dd4a0ab0144afe4d0bc71db6cf729e3a228c078a375760
-
SHA512
0d175492544f34600f9f08691695728b4d078715e05adfea1680f3e8d8e18401cef8fb3f8e55391bb60b730d3d7a061914ab48d31a126eb2adf802d742e2f11f
-
SSDEEP
12288:8paLUt4OPIzFKaLFkGs/zFAJ/mvDotz57agfPJ61AsZfQgRm+RfcRSBD:7mIzFK4sFs/l1a+9s6g480R2D
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/208-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/208-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3960-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3960-21-0x0000000005420000-0x00000000055B3000-memory.dmp xmrig behavioral2/memory/3960-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3960-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3960 8d883d66570955cc4b468022f5fc8a1a.exe -
Executes dropped EXE 1 IoCs
pid Process 3960 8d883d66570955cc4b468022f5fc8a1a.exe -
resource yara_rule behavioral2/memory/208-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000700000002321b-11.dat upx behavioral2/memory/3960-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 208 8d883d66570955cc4b468022f5fc8a1a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 208 8d883d66570955cc4b468022f5fc8a1a.exe 3960 8d883d66570955cc4b468022f5fc8a1a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 208 wrote to memory of 3960 208 8d883d66570955cc4b468022f5fc8a1a.exe 85 PID 208 wrote to memory of 3960 208 8d883d66570955cc4b468022f5fc8a1a.exe 85 PID 208 wrote to memory of 3960 208 8d883d66570955cc4b468022f5fc8a1a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d883d66570955cc4b468022f5fc8a1a.exe"C:\Users\Admin\AppData\Local\Temp\8d883d66570955cc4b468022f5fc8a1a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\8d883d66570955cc4b468022f5fc8a1a.exeC:\Users\Admin\AppData\Local\Temp\8d883d66570955cc4b468022f5fc8a1a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3960
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5647bb15a48d687926a1ed2669154f2f9
SHA17646beb624a6e83648d3197cb1e41ec4b6ed82e2
SHA256c51e22c9cb7fa95b173879e98e8862b9c06b6818a3a6b9016ab318a688a50893
SHA5129f39ace01cafc20a37f95794825d59c9a52693bbc3f6fc6ed10552fd935cfd7a5a7961ab8d6f11db87c6c1f0cab24c2b33ca32c7f485264646acd272c92c1917