Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 05:54
Behavioral task
behavioral1
Sample
b6abfc4f3d0065c2e74d710f186dddda.exe
Resource
win7-20240221-en
General
-
Target
b6abfc4f3d0065c2e74d710f186dddda.exe
-
Size
784KB
-
MD5
b6abfc4f3d0065c2e74d710f186dddda
-
SHA1
3420a5ec4758483424997092c770b90a46acbaa2
-
SHA256
4176b803c89a47b07c922b9ab1f1a7ec46b732b953aaca9a95fbb795c0d360a9
-
SHA512
94b3d5d7074a201859c801855537dbbe2ee52a7228ebd735a9729d01fa62c1033fee0890e41fc94ca93eccc4180f49f96f720790cae068b28c4d0f73ac8bf0f7
-
SSDEEP
24576:d+A6S2U5zWp280qyybA68Rkwd2wUuQyG:d+AtbS2KyyU68T2BJV
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/1956-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2968-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1956-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2968-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2968-26-0x0000000002FE0000-0x0000000003173000-memory.dmp xmrig behavioral1/memory/2968-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2968-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2968 b6abfc4f3d0065c2e74d710f186dddda.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 b6abfc4f3d0065c2e74d710f186dddda.exe -
Loads dropped DLL 1 IoCs
pid Process 1956 b6abfc4f3d0065c2e74d710f186dddda.exe -
resource yara_rule behavioral1/memory/1956-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000c00000001234b-10.dat upx behavioral1/memory/1956-15-0x00000000032C0000-0x00000000035D2000-memory.dmp upx behavioral1/memory/2968-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1956 b6abfc4f3d0065c2e74d710f186dddda.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1956 b6abfc4f3d0065c2e74d710f186dddda.exe 2968 b6abfc4f3d0065c2e74d710f186dddda.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2968 1956 b6abfc4f3d0065c2e74d710f186dddda.exe 29 PID 1956 wrote to memory of 2968 1956 b6abfc4f3d0065c2e74d710f186dddda.exe 29 PID 1956 wrote to memory of 2968 1956 b6abfc4f3d0065c2e74d710f186dddda.exe 29 PID 1956 wrote to memory of 2968 1956 b6abfc4f3d0065c2e74d710f186dddda.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6abfc4f3d0065c2e74d710f186dddda.exe"C:\Users\Admin\AppData\Local\Temp\b6abfc4f3d0065c2e74d710f186dddda.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\b6abfc4f3d0065c2e74d710f186dddda.exeC:\Users\Admin\AppData\Local\Temp\b6abfc4f3d0065c2e74d710f186dddda.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2968
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5430c3b201aef3e9f0f069cf071af3deb
SHA1e14232792ad09dc0122bb55abeb410c8c7b02056
SHA25626dd57d1855f1433d8258b4f3ae5965a5902bd87e597d46e8ba5dac39b9643d1
SHA512e42782209e1e97af5b2c2b501d7af251b59762617ed999a578a49c7b660a073eed7f8b647a8a4e5f499716d8b2e7e0fdeb91adda0ca5d3f6aaa111e8dd8d5fd3