Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 00:50
Behavioral task
behavioral1
Sample
95d0e13e62d10a990e490690ac735a13.exe
Resource
win7-20231215-en
General
-
Target
95d0e13e62d10a990e490690ac735a13.exe
-
Size
784KB
-
MD5
95d0e13e62d10a990e490690ac735a13
-
SHA1
f82c380eda427dfaad2a07a722134e972863ade8
-
SHA256
16dc27f2c42437c00cb3205f779f3c4ee168a21b0cbf60120b5c8faae38568ac
-
SHA512
6dbacfdaf9ced6f684d0a13489ca2a3e87cb141554f24fbdacdf547fec4de177595239bb7f7f5152259285aaa133789084c17ba8cda05a5ea4849ec8e5ba711d
-
SSDEEP
24576:aQNWf9S/gMTP9NXpx2IOaZvOZhO7lw1LZAg:aQMf93MTPPL9BChuAh
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/1288-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1288-16-0x0000000003140000-0x0000000003452000-memory.dmp xmrig behavioral1/memory/1288-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2676-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2676-25-0x0000000003220000-0x00000000033B3000-memory.dmp xmrig behavioral1/memory/2676-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2676-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1288-35-0x0000000003140000-0x0000000003452000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2676 95d0e13e62d10a990e490690ac735a13.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 95d0e13e62d10a990e490690ac735a13.exe -
Loads dropped DLL 1 IoCs
pid Process 1288 95d0e13e62d10a990e490690ac735a13.exe -
resource yara_rule behavioral1/memory/1288-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x0008000000012267-10.dat upx behavioral1/memory/2676-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1288 95d0e13e62d10a990e490690ac735a13.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1288 95d0e13e62d10a990e490690ac735a13.exe 2676 95d0e13e62d10a990e490690ac735a13.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2676 1288 95d0e13e62d10a990e490690ac735a13.exe 29 PID 1288 wrote to memory of 2676 1288 95d0e13e62d10a990e490690ac735a13.exe 29 PID 1288 wrote to memory of 2676 1288 95d0e13e62d10a990e490690ac735a13.exe 29 PID 1288 wrote to memory of 2676 1288 95d0e13e62d10a990e490690ac735a13.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\95d0e13e62d10a990e490690ac735a13.exe"C:\Users\Admin\AppData\Local\Temp\95d0e13e62d10a990e490690ac735a13.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\95d0e13e62d10a990e490690ac735a13.exeC:\Users\Admin\AppData\Local\Temp\95d0e13e62d10a990e490690ac735a13.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2676
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5053eafe8a00468b4e49dd7c888190722
SHA11e78ffdecd8e97c18cc078c5675faed2f443aadf
SHA2562f8d8dc6c5cc4aee1a06e174153cdb225b0057539cae596d0849a4d9bdcffe8f
SHA512d1bc1989410f8d6ae60f227fb42a765ecfcb0949cf2c10e5d776e145cdc8a081db6948e16526fdada6352a212b717b21dc71c8d5ee61ef5950763666aa98403c