Analysis
-
max time kernel
91s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 11:31
Behavioral task
behavioral1
Sample
8f0ae785aac63355204f383ed106003f.exe
Resource
win7-20231215-en
General
-
Target
8f0ae785aac63355204f383ed106003f.exe
-
Size
784KB
-
MD5
8f0ae785aac63355204f383ed106003f
-
SHA1
ae4be01a0f614758a94b39624b92b6dfcc7a8a00
-
SHA256
3c9a0e9673e294e5970469eba9c5bb754b2768108598616015878185d8009dc3
-
SHA512
80b9c5290d789f40bc721e8c8b61b1cd046915de8b3cb9dbf0e802470751cf6cb214869408f96763d9dd88bf35489bd6b54f073fc3f7021285bea989df9e4060
-
SSDEEP
24576:07roPWVrEuBqOjj2ubyG9vj7WFvxzG5PN18U1yWDI/71wYO8b7x5:2ou17Niubp9vjSzgj1yWDI9x5
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4948-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4948-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1576-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1576-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1576-23-0x0000000005480000-0x0000000005613000-memory.dmp xmrig behavioral2/memory/1576-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1576 8f0ae785aac63355204f383ed106003f.exe -
Executes dropped EXE 1 IoCs
pid Process 1576 8f0ae785aac63355204f383ed106003f.exe -
resource yara_rule behavioral2/memory/4948-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0008000000023243-11.dat upx behavioral2/memory/1576-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4948 8f0ae785aac63355204f383ed106003f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4948 8f0ae785aac63355204f383ed106003f.exe 1576 8f0ae785aac63355204f383ed106003f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 1576 4948 8f0ae785aac63355204f383ed106003f.exe 86 PID 4948 wrote to memory of 1576 4948 8f0ae785aac63355204f383ed106003f.exe 86 PID 4948 wrote to memory of 1576 4948 8f0ae785aac63355204f383ed106003f.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f0ae785aac63355204f383ed106003f.exe"C:\Users\Admin\AppData\Local\Temp\8f0ae785aac63355204f383ed106003f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\8f0ae785aac63355204f383ed106003f.exeC:\Users\Admin\AppData\Local\Temp\8f0ae785aac63355204f383ed106003f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD5631577eafe02c4fab7c27216030402e7
SHA1c336fb3474661d723e2db109589903e0e400683f
SHA2562bbec553ae39b39cc382b5676bb7abf5dac537e69030a200ab3b579e87191113
SHA512a3b1d97e2eb63fb4051f61526c9ae388369bddca546938632fb89b4aecfd8180f6cd9860726e291dd61ab137110f13735374c9b0f0f85b0dc72a4c5b4dcd1fac