Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 21:22
Behavioral task
behavioral1
Sample
bcd5b014f5e5500c51c226343ad457ca.exe
Resource
win7-20231129-en
General
-
Target
bcd5b014f5e5500c51c226343ad457ca.exe
-
Size
784KB
-
MD5
bcd5b014f5e5500c51c226343ad457ca
-
SHA1
2a3ac9689aa155a9c93a91d8b60f12775b7dc9dd
-
SHA256
9a73253bbcf99037bfdd28303bf81ddd5fd4dc0fce5396a9513ff4aa13b96992
-
SHA512
b813fbc17fcc190e04104d43f074b954e12c69104749aa58707d292e1c36fad3878c96a804241e6eb84ab24b28e40a21f2b2422dcf319df25dc0d5c58821a422
-
SSDEEP
24576:JUdQrg88czjzcywfJVVrzQT1vjpsOG/C:JUCgjA6DV/4Rpl
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/1540-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1540-15-0x0000000003080000-0x0000000003392000-memory.dmp xmrig behavioral1/memory/1528-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1540-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1528-25-0x0000000003050000-0x00000000031E3000-memory.dmp xmrig behavioral1/memory/1528-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1528-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/1528-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1528 bcd5b014f5e5500c51c226343ad457ca.exe -
Executes dropped EXE 1 IoCs
pid Process 1528 bcd5b014f5e5500c51c226343ad457ca.exe -
Loads dropped DLL 1 IoCs
pid Process 1540 bcd5b014f5e5500c51c226343ad457ca.exe -
resource yara_rule behavioral1/memory/1540-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000a000000013a21-10.dat upx behavioral1/memory/1540-15-0x0000000003080000-0x0000000003392000-memory.dmp upx behavioral1/memory/1528-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1540 bcd5b014f5e5500c51c226343ad457ca.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1540 bcd5b014f5e5500c51c226343ad457ca.exe 1528 bcd5b014f5e5500c51c226343ad457ca.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1528 1540 bcd5b014f5e5500c51c226343ad457ca.exe 29 PID 1540 wrote to memory of 1528 1540 bcd5b014f5e5500c51c226343ad457ca.exe 29 PID 1540 wrote to memory of 1528 1540 bcd5b014f5e5500c51c226343ad457ca.exe 29 PID 1540 wrote to memory of 1528 1540 bcd5b014f5e5500c51c226343ad457ca.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcd5b014f5e5500c51c226343ad457ca.exe"C:\Users\Admin\AppData\Local\Temp\bcd5b014f5e5500c51c226343ad457ca.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\bcd5b014f5e5500c51c226343ad457ca.exeC:\Users\Admin\AppData\Local\Temp\bcd5b014f5e5500c51c226343ad457ca.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1528
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5759195b87c2d387ad1c027c5008dc948
SHA12ac8f97ab775045fa34deda9be5d8be7307a647f
SHA25684f9e994fe0459416081cacd4d0a77a24a633f73e63a86924773d11e9eabc310
SHA512802aff74a31c5a2e0a9a29f75863a1f68f4239304701bcc0069bb974d733a777db0e79d6440004aaa40750cd01bee42e4d200ec471edbdcb5e4da1f174e7509d