Analysis
-
max time kernel
93s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 11:50
Behavioral task
behavioral1
Sample
97163d84dbe910e76bfc46dfe3ec986a.exe
Resource
win7-20231215-en
General
-
Target
97163d84dbe910e76bfc46dfe3ec986a.exe
-
Size
784KB
-
MD5
97163d84dbe910e76bfc46dfe3ec986a
-
SHA1
f0fa7ef4e203fe50acfe59b8dfc0a02d866afcc1
-
SHA256
18887ca5056fffcc77b6a0bd1ce9ed2a0fe8d2431d76fe144512d2a6f507399a
-
SHA512
4cbf8464571a8c6b9926f68863949944ae06ad61c9a66f7fa5c9c6c4434efdfb13f8439919c104012cc6870c8bfcc83d2120129e10b8581d9fd1fe5cbc8f08d6
-
SSDEEP
24576:pCdRDgG/M8UGuwcJT98a4nPlODDDGHSMWf:KNvMwcJpuPMqNW
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1180-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1180-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4976-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4976-20-0x0000000005400000-0x0000000005593000-memory.dmp xmrig behavioral2/memory/4976-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4976-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4976 97163d84dbe910e76bfc46dfe3ec986a.exe -
Executes dropped EXE 1 IoCs
pid Process 4976 97163d84dbe910e76bfc46dfe3ec986a.exe -
resource yara_rule behavioral2/memory/1180-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0008000000023225-11.dat upx behavioral2/memory/4976-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1180 97163d84dbe910e76bfc46dfe3ec986a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1180 97163d84dbe910e76bfc46dfe3ec986a.exe 4976 97163d84dbe910e76bfc46dfe3ec986a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 4976 1180 97163d84dbe910e76bfc46dfe3ec986a.exe 86 PID 1180 wrote to memory of 4976 1180 97163d84dbe910e76bfc46dfe3ec986a.exe 86 PID 1180 wrote to memory of 4976 1180 97163d84dbe910e76bfc46dfe3ec986a.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\97163d84dbe910e76bfc46dfe3ec986a.exe"C:\Users\Admin\AppData\Local\Temp\97163d84dbe910e76bfc46dfe3ec986a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\97163d84dbe910e76bfc46dfe3ec986a.exeC:\Users\Admin\AppData\Local\Temp\97163d84dbe910e76bfc46dfe3ec986a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4976
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD53e8373814c52301375c16fc4cca39e74
SHA101a5f2ab32fdd4f13d6642553a6f0299379cfc2a
SHA2561669d3179fc3e7d33a095c3c7de9d3ad2acec65f4ee05162908005a957edcee5
SHA512d279e6c1940bd549d3c954616efff0c38f0d2b755f2ae2f3afb6e6f8ea7d2d2e648bb004cf9335198e4477425db17a0e4d002ce10c626c2078aa07f2f1e61896