Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 03:40

General

  • Target

    ba6c000ff4cb119343ca00794b95909d.exe

  • Size

    784KB

  • MD5

    ba6c000ff4cb119343ca00794b95909d

  • SHA1

    97a8a55a82d9f0dc1023c33c7bcb6213233e9395

  • SHA256

    70abaf91c3e9bd47c3c8d4569b991902d539db9ca76d4cf0f2ac410f40fa210f

  • SHA512

    9d80ae4b10d550b240fcf00eaaeba19f980a297b710827a2c53d03e80392af5c9493be799bfcf4519941720bb248b8ccfbb19ec752687fd1b85f232967d394a3

  • SSDEEP

    24576:QjU7G4Jsu4EnT8Fa18ivc+ZrbUverkiYOTJwvoQhG3OHN:esyu481dv5E2rlYgJwvO3oN

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 6 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba6c000ff4cb119343ca00794b95909d.exe
    "C:\Users\Admin\AppData\Local\Temp\ba6c000ff4cb119343ca00794b95909d.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4992
    • C:\Users\Admin\AppData\Local\Temp\ba6c000ff4cb119343ca00794b95909d.exe
      C:\Users\Admin\AppData\Local\Temp\ba6c000ff4cb119343ca00794b95909d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ba6c000ff4cb119343ca00794b95909d.exe

    Filesize

    784KB

    MD5

    e8831e0f6f642d73c7f256c4c8085de5

    SHA1

    64b59f42648ec4479bc6349382f6d57a1eafeeb8

    SHA256

    28dca1230ae9c61d6d0ecf7a93e8beaf9c6e408e36ebbc7c6891ae1acd0efa79

    SHA512

    c650b052c52d239ee6ece0c355a77650362e40a32889143e53bc129d8283b18f3f9a49aa29ea75e16db43e654cc74e528031243a7a0b9946509a3572a627796a

  • memory/860-13-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/860-14-0x0000000001A00000-0x0000000001AC4000-memory.dmp

    Filesize

    784KB

  • memory/860-15-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/860-20-0x00000000053F0000-0x0000000005583000-memory.dmp

    Filesize

    1.6MB

  • memory/860-21-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/860-30-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/4992-0-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/4992-1-0x0000000001720000-0x00000000017E4000-memory.dmp

    Filesize

    784KB

  • memory/4992-2-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/4992-12-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB