Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 20:53
Behavioral task
behavioral1
Sample
acd53ede7fa369984fa54f897bb754d2.exe
Resource
win7-20240221-en
General
-
Target
acd53ede7fa369984fa54f897bb754d2.exe
-
Size
784KB
-
MD5
acd53ede7fa369984fa54f897bb754d2
-
SHA1
dd36a9bba8bf39b8bdf90d92a1d2fb746341a685
-
SHA256
6401d53fdddb6194e884e7079f9b69059bd1fb4fe78b5d3b30029571adf4a893
-
SHA512
fe354700b4ee6028c76bc6eeb178280ed503c934f66cf22d2b1552aa1e2db60941cd69b150f250b8efd12cd4f35b359c0efe453508cc5c9e135efc65251aae0d
-
SSDEEP
12288:m26yxIDBq9bVwZe1iTegx7DyFe6EsfiXB5yuSeUPTU0C58mOdkdk6Lw+j5lhYtk:sDBq9qLTegNk5U/R+QD5BPdA+
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1132-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1132-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3136-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3136-20-0x00000000054A0000-0x0000000005633000-memory.dmp xmrig behavioral2/memory/3136-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3136-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3136 acd53ede7fa369984fa54f897bb754d2.exe -
Executes dropped EXE 1 IoCs
pid Process 3136 acd53ede7fa369984fa54f897bb754d2.exe -
resource yara_rule behavioral2/memory/1132-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023223-11.dat upx behavioral2/memory/3136-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1132 acd53ede7fa369984fa54f897bb754d2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1132 acd53ede7fa369984fa54f897bb754d2.exe 3136 acd53ede7fa369984fa54f897bb754d2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1132 wrote to memory of 3136 1132 acd53ede7fa369984fa54f897bb754d2.exe 90 PID 1132 wrote to memory of 3136 1132 acd53ede7fa369984fa54f897bb754d2.exe 90 PID 1132 wrote to memory of 3136 1132 acd53ede7fa369984fa54f897bb754d2.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\acd53ede7fa369984fa54f897bb754d2.exe"C:\Users\Admin\AppData\Local\Temp\acd53ede7fa369984fa54f897bb754d2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\acd53ede7fa369984fa54f897bb754d2.exeC:\Users\Admin\AppData\Local\Temp\acd53ede7fa369984fa54f897bb754d2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3136
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5334a18beeda98512e437144424183278
SHA125612b33509b8a27a7bbd91954a3f3e3bb960600
SHA2566383af5af40d87677bec15e2e1bdc6fee5ffced416d5a1f199a14aa42513fae2
SHA512be1e80aa2590c2b7fbf9f8b65e48d4bffaa899ae87bd66f8c7ec233a3442aa3141195f0fe5c046fae260568d494490b8b66339ea58e43990d08d6a92a67cd7de