Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 19:28
Behavioral task
behavioral1
Sample
bc9c322bb4a89e7f1ac7d58af49242c3.exe
Resource
win7-20240215-en
General
-
Target
bc9c322bb4a89e7f1ac7d58af49242c3.exe
-
Size
784KB
-
MD5
bc9c322bb4a89e7f1ac7d58af49242c3
-
SHA1
ea104f4c6163bbb908be6be086e0f1e9a82eda03
-
SHA256
80b2650c05d118435e6545de1a11fb7bd6a82070ba6da060f6c3a25e6b7a5bf5
-
SHA512
f26dcf52398186f66c385ae6fb3213bbee320f005dd70808d05cbc11aebb2d3a1743d6cc77e5b860f158d6a02945c2503ece4c2118cc221bf41823dea582a045
-
SSDEEP
12288:QXWxLzXU71z/kgduTyeLL8ywV/QqexMLCkZ8VTOzOlAeSYh5o5bjCJ1ELrtjp:QXWxbW/d0ys3QexMLZqOteT8jC7EnD
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2208-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2564-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2208-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2564-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2564-25-0x00000000030E0000-0x0000000003273000-memory.dmp xmrig behavioral1/memory/2564-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2564-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2564 bc9c322bb4a89e7f1ac7d58af49242c3.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 bc9c322bb4a89e7f1ac7d58af49242c3.exe -
Loads dropped DLL 1 IoCs
pid Process 2208 bc9c322bb4a89e7f1ac7d58af49242c3.exe -
resource yara_rule behavioral1/memory/2208-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000a000000012252-10.dat upx behavioral1/memory/2208-15-0x0000000003150000-0x0000000003462000-memory.dmp upx behavioral1/memory/2564-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2208 bc9c322bb4a89e7f1ac7d58af49242c3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2208 bc9c322bb4a89e7f1ac7d58af49242c3.exe 2564 bc9c322bb4a89e7f1ac7d58af49242c3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2564 2208 bc9c322bb4a89e7f1ac7d58af49242c3.exe 30 PID 2208 wrote to memory of 2564 2208 bc9c322bb4a89e7f1ac7d58af49242c3.exe 30 PID 2208 wrote to memory of 2564 2208 bc9c322bb4a89e7f1ac7d58af49242c3.exe 30 PID 2208 wrote to memory of 2564 2208 bc9c322bb4a89e7f1ac7d58af49242c3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc9c322bb4a89e7f1ac7d58af49242c3.exe"C:\Users\Admin\AppData\Local\Temp\bc9c322bb4a89e7f1ac7d58af49242c3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\bc9c322bb4a89e7f1ac7d58af49242c3.exeC:\Users\Admin\AppData\Local\Temp\bc9c322bb4a89e7f1ac7d58af49242c3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2564
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5a986493f67ed0ad800a67f6b22d8c5b6
SHA1878972736e27961c842fbb498a2a1443408e6a6d
SHA256f25e0b57278d3b6127137314c42508254baafe45d662e36753f3c022fcef76cf
SHA51262e07fb107f16ffa74291bbba284c255de72211bd18c591869d3be984077aa89d81698f61e875ed6b7da626e03d0959e14f02b5a1e6a7231d7861546c985c9ef