Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 00:50
Behavioral task
behavioral1
Sample
95d0e13e62d10a990e490690ac735a13.exe
Resource
win7-20231215-en
General
-
Target
95d0e13e62d10a990e490690ac735a13.exe
-
Size
784KB
-
MD5
95d0e13e62d10a990e490690ac735a13
-
SHA1
f82c380eda427dfaad2a07a722134e972863ade8
-
SHA256
16dc27f2c42437c00cb3205f779f3c4ee168a21b0cbf60120b5c8faae38568ac
-
SHA512
6dbacfdaf9ced6f684d0a13489ca2a3e87cb141554f24fbdacdf547fec4de177595239bb7f7f5152259285aaa133789084c17ba8cda05a5ea4849ec8e5ba711d
-
SSDEEP
24576:aQNWf9S/gMTP9NXpx2IOaZvOZhO7lw1LZAg:aQMf93MTPPL9BChuAh
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/2604-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2604-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2936-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2936-20-0x0000000005440000-0x00000000055D3000-memory.dmp xmrig behavioral2/memory/2936-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2936-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2936 95d0e13e62d10a990e490690ac735a13.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 95d0e13e62d10a990e490690ac735a13.exe -
resource yara_rule behavioral2/memory/2604-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00070000000231ff-11.dat upx behavioral2/memory/2936-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2604 95d0e13e62d10a990e490690ac735a13.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2604 95d0e13e62d10a990e490690ac735a13.exe 2936 95d0e13e62d10a990e490690ac735a13.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2936 2604 95d0e13e62d10a990e490690ac735a13.exe 85 PID 2604 wrote to memory of 2936 2604 95d0e13e62d10a990e490690ac735a13.exe 85 PID 2604 wrote to memory of 2936 2604 95d0e13e62d10a990e490690ac735a13.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\95d0e13e62d10a990e490690ac735a13.exe"C:\Users\Admin\AppData\Local\Temp\95d0e13e62d10a990e490690ac735a13.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\95d0e13e62d10a990e490690ac735a13.exeC:\Users\Admin\AppData\Local\Temp\95d0e13e62d10a990e490690ac735a13.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD588ee40717ccda573012d04afd3fba700
SHA1e5dd46715ca9a84e0933cc6b5e8d5d67ed70fa7e
SHA256f22620734822e5c8d84fc383d05fe6b56c79d1258e99fd8de248f49a6c0b1276
SHA5124182c123444a19af151c79a97c8b645eb29e163918a24e68b1f8d5d232c831deab7cc22d91ec7689ec667dec06b105e1160e5c49437902a98877bcf0ca90e79c