Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 11:50
Behavioral task
behavioral1
Sample
97163d84dbe910e76bfc46dfe3ec986a.exe
Resource
win7-20231215-en
General
-
Target
97163d84dbe910e76bfc46dfe3ec986a.exe
-
Size
784KB
-
MD5
97163d84dbe910e76bfc46dfe3ec986a
-
SHA1
f0fa7ef4e203fe50acfe59b8dfc0a02d866afcc1
-
SHA256
18887ca5056fffcc77b6a0bd1ce9ed2a0fe8d2431d76fe144512d2a6f507399a
-
SHA512
4cbf8464571a8c6b9926f68863949944ae06ad61c9a66f7fa5c9c6c4434efdfb13f8439919c104012cc6870c8bfcc83d2120129e10b8581d9fd1fe5cbc8f08d6
-
SSDEEP
24576:pCdRDgG/M8UGuwcJT98a4nPlODDDGHSMWf:KNvMwcJpuPMqNW
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/1588-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1588-15-0x0000000003100000-0x0000000003412000-memory.dmp xmrig behavioral1/memory/1588-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2756-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2756-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2756-25-0x0000000003150000-0x00000000032E3000-memory.dmp xmrig behavioral1/memory/2756-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2756 97163d84dbe910e76bfc46dfe3ec986a.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 97163d84dbe910e76bfc46dfe3ec986a.exe -
Loads dropped DLL 1 IoCs
pid Process 1588 97163d84dbe910e76bfc46dfe3ec986a.exe -
resource yara_rule behavioral1/memory/1588-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000900000001225c-16.dat upx behavioral1/memory/2756-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1588 97163d84dbe910e76bfc46dfe3ec986a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1588 97163d84dbe910e76bfc46dfe3ec986a.exe 2756 97163d84dbe910e76bfc46dfe3ec986a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1588 wrote to memory of 2756 1588 97163d84dbe910e76bfc46dfe3ec986a.exe 29 PID 1588 wrote to memory of 2756 1588 97163d84dbe910e76bfc46dfe3ec986a.exe 29 PID 1588 wrote to memory of 2756 1588 97163d84dbe910e76bfc46dfe3ec986a.exe 29 PID 1588 wrote to memory of 2756 1588 97163d84dbe910e76bfc46dfe3ec986a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\97163d84dbe910e76bfc46dfe3ec986a.exe"C:\Users\Admin\AppData\Local\Temp\97163d84dbe910e76bfc46dfe3ec986a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\97163d84dbe910e76bfc46dfe3ec986a.exeC:\Users\Admin\AppData\Local\Temp\97163d84dbe910e76bfc46dfe3ec986a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2756
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5bfab54fb23a19d9582e7ab3595882022
SHA1cbda9de06c8e36a4f7119d7d3fb981a74a9d2b25
SHA256448758b244c7ae1847dc4791e9b7ab27a2297e547d3997902617d5da5ae74949
SHA512374c122af91198e5ac4057c7112ade776e0a8e9d92daf2d43d5afac7bae92603020d8af2512e59274a88d15835dc02d608add9d4d7f927d97859839a346b7d1a