Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 05:54
Behavioral task
behavioral1
Sample
b6abfc4f3d0065c2e74d710f186dddda.exe
Resource
win7-20240221-en
General
-
Target
b6abfc4f3d0065c2e74d710f186dddda.exe
-
Size
784KB
-
MD5
b6abfc4f3d0065c2e74d710f186dddda
-
SHA1
3420a5ec4758483424997092c770b90a46acbaa2
-
SHA256
4176b803c89a47b07c922b9ab1f1a7ec46b732b953aaca9a95fbb795c0d360a9
-
SHA512
94b3d5d7074a201859c801855537dbbe2ee52a7228ebd735a9729d01fa62c1033fee0890e41fc94ca93eccc4180f49f96f720790cae068b28c4d0f73ac8bf0f7
-
SSDEEP
24576:d+A6S2U5zWp280qyybA68Rkwd2wUuQyG:d+AtbS2KyyU68T2BJV
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/4268-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4268-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4772-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4772-21-0x0000000005380000-0x0000000005513000-memory.dmp xmrig behavioral2/memory/4772-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4772-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/4772-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4772 b6abfc4f3d0065c2e74d710f186dddda.exe -
Executes dropped EXE 1 IoCs
pid Process 4772 b6abfc4f3d0065c2e74d710f186dddda.exe -
resource yara_rule behavioral2/memory/4268-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000800000002322c-11.dat upx behavioral2/memory/4772-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4268 b6abfc4f3d0065c2e74d710f186dddda.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4268 b6abfc4f3d0065c2e74d710f186dddda.exe 4772 b6abfc4f3d0065c2e74d710f186dddda.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4268 wrote to memory of 4772 4268 b6abfc4f3d0065c2e74d710f186dddda.exe 90 PID 4268 wrote to memory of 4772 4268 b6abfc4f3d0065c2e74d710f186dddda.exe 90 PID 4268 wrote to memory of 4772 4268 b6abfc4f3d0065c2e74d710f186dddda.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6abfc4f3d0065c2e74d710f186dddda.exe"C:\Users\Admin\AppData\Local\Temp\b6abfc4f3d0065c2e74d710f186dddda.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\b6abfc4f3d0065c2e74d710f186dddda.exeC:\Users\Admin\AppData\Local\Temp\b6abfc4f3d0065c2e74d710f186dddda.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5d65795e6e5b8976a8e2120d8f9e46095
SHA1f3398e648ca598a5203c8a1fb2261298935e2350
SHA25612ad8bffd74dfd8cc9322d75d010f9b32cf93351098f46cc4838989c9852fbde
SHA51241cfc13d9d8c6adb47e7d46a13d59c381feb5bb1bd82ff79849f0fa3760300beaaf7caecc2b8499d18c797f080b2d02732f06e5bc86f307f656d77d74168f624