Analysis
-
max time kernel
90s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 03:02
Behavioral task
behavioral1
Sample
8e0d4df4e6f714404ef3de73b3ac23ed.exe
Resource
win7-20231215-en
General
-
Target
8e0d4df4e6f714404ef3de73b3ac23ed.exe
-
Size
784KB
-
MD5
8e0d4df4e6f714404ef3de73b3ac23ed
-
SHA1
e4e89bba362031ac81c4061c0e364d912051d39c
-
SHA256
9591acc093289d54256ea6177c083e81a5f7f3ec77e50a9fc533d3eb5f7333f2
-
SHA512
cad1f019abde0f717522616cfee128503f79f7fbdd54739f32b3106ab5734a76eb39d58a77bb12fc9cd16414a32bf471eca03b4a391f33730c27352bcd938a56
-
SSDEEP
24576:++lEpkbue2U+KWX6FZxNj7g2qPlNuznBPm9u4f1:++SkbuAycZnCPGPiXf
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/528-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/528-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2608-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2608-20-0x00000000052F0000-0x0000000005483000-memory.dmp xmrig behavioral2/memory/2608-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2608-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2608-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2608 8e0d4df4e6f714404ef3de73b3ac23ed.exe -
Executes dropped EXE 1 IoCs
pid Process 2608 8e0d4df4e6f714404ef3de73b3ac23ed.exe -
resource yara_rule behavioral2/memory/528-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000800000002320e-11.dat upx behavioral2/memory/2608-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 528 8e0d4df4e6f714404ef3de73b3ac23ed.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 528 8e0d4df4e6f714404ef3de73b3ac23ed.exe 2608 8e0d4df4e6f714404ef3de73b3ac23ed.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 528 wrote to memory of 2608 528 8e0d4df4e6f714404ef3de73b3ac23ed.exe 37 PID 528 wrote to memory of 2608 528 8e0d4df4e6f714404ef3de73b3ac23ed.exe 37 PID 528 wrote to memory of 2608 528 8e0d4df4e6f714404ef3de73b3ac23ed.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e0d4df4e6f714404ef3de73b3ac23ed.exe"C:\Users\Admin\AppData\Local\Temp\8e0d4df4e6f714404ef3de73b3ac23ed.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\8e0d4df4e6f714404ef3de73b3ac23ed.exeC:\Users\Admin\AppData\Local\Temp\8e0d4df4e6f714404ef3de73b3ac23ed.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5a9a38ba6a82f46b46e9a8e5413dfe77c
SHA1e3338f5d69a2a8def18d845ed76d8b983c3e82b0
SHA2567824919213a37c45bcfa3c0188a9c5593aafba8129b19df195be1b2430725713
SHA5125b71732805d0308379d1b8d54182fd546cfe5a38ec3ae8aa07f6416a3ab266d4f1b3033d53da9897d83974d21e882cbe7a8d3a803cba4024163c2400e6464e4a