Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 03:40
Behavioral task
behavioral1
Sample
ba6c000ff4cb119343ca00794b95909d.exe
Resource
win7-20240221-en
General
-
Target
ba6c000ff4cb119343ca00794b95909d.exe
-
Size
784KB
-
MD5
ba6c000ff4cb119343ca00794b95909d
-
SHA1
97a8a55a82d9f0dc1023c33c7bcb6213233e9395
-
SHA256
70abaf91c3e9bd47c3c8d4569b991902d539db9ca76d4cf0f2ac410f40fa210f
-
SHA512
9d80ae4b10d550b240fcf00eaaeba19f980a297b710827a2c53d03e80392af5c9493be799bfcf4519941720bb248b8ccfbb19ec752687fd1b85f232967d394a3
-
SSDEEP
24576:QjU7G4Jsu4EnT8Fa18ivc+ZrbUverkiYOTJwvoQhG3OHN:esyu481dv5E2rlYgJwvO3oN
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4992-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4992-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/860-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/860-20-0x00000000053F0000-0x0000000005583000-memory.dmp xmrig behavioral2/memory/860-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/860-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 860 ba6c000ff4cb119343ca00794b95909d.exe -
Executes dropped EXE 1 IoCs
pid Process 860 ba6c000ff4cb119343ca00794b95909d.exe -
resource yara_rule behavioral2/memory/4992-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00080000000231f9-11.dat upx behavioral2/memory/860-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4992 ba6c000ff4cb119343ca00794b95909d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4992 ba6c000ff4cb119343ca00794b95909d.exe 860 ba6c000ff4cb119343ca00794b95909d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4992 wrote to memory of 860 4992 ba6c000ff4cb119343ca00794b95909d.exe 90 PID 4992 wrote to memory of 860 4992 ba6c000ff4cb119343ca00794b95909d.exe 90 PID 4992 wrote to memory of 860 4992 ba6c000ff4cb119343ca00794b95909d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba6c000ff4cb119343ca00794b95909d.exe"C:\Users\Admin\AppData\Local\Temp\ba6c000ff4cb119343ca00794b95909d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\ba6c000ff4cb119343ca00794b95909d.exeC:\Users\Admin\AppData\Local\Temp\ba6c000ff4cb119343ca00794b95909d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:860
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5e8831e0f6f642d73c7f256c4c8085de5
SHA164b59f42648ec4479bc6349382f6d57a1eafeeb8
SHA25628dca1230ae9c61d6d0ecf7a93e8beaf9c6e408e36ebbc7c6891ae1acd0efa79
SHA512c650b052c52d239ee6ece0c355a77650362e40a32889143e53bc129d8283b18f3f9a49aa29ea75e16db43e654cc74e528031243a7a0b9946509a3572a627796a