Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 21:22

General

  • Target

    bcd5b014f5e5500c51c226343ad457ca.exe

  • Size

    784KB

  • MD5

    bcd5b014f5e5500c51c226343ad457ca

  • SHA1

    2a3ac9689aa155a9c93a91d8b60f12775b7dc9dd

  • SHA256

    9a73253bbcf99037bfdd28303bf81ddd5fd4dc0fce5396a9513ff4aa13b96992

  • SHA512

    b813fbc17fcc190e04104d43f074b954e12c69104749aa58707d292e1c36fad3878c96a804241e6eb84ab24b28e40a21f2b2422dcf319df25dc0d5c58821a422

  • SSDEEP

    24576:JUdQrg88czjzcywfJVVrzQT1vjpsOG/C:JUCgjA6DV/4Rpl

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 8 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcd5b014f5e5500c51c226343ad457ca.exe
    "C:\Users\Admin\AppData\Local\Temp\bcd5b014f5e5500c51c226343ad457ca.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Users\Admin\AppData\Local\Temp\bcd5b014f5e5500c51c226343ad457ca.exe
      C:\Users\Admin\AppData\Local\Temp\bcd5b014f5e5500c51c226343ad457ca.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1528

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\bcd5b014f5e5500c51c226343ad457ca.exe

    Filesize

    784KB

    MD5

    759195b87c2d387ad1c027c5008dc948

    SHA1

    2ac8f97ab775045fa34deda9be5d8be7307a647f

    SHA256

    84f9e994fe0459416081cacd4d0a77a24a633f73e63a86924773d11e9eabc310

    SHA512

    802aff74a31c5a2e0a9a29f75863a1f68f4239304701bcc0069bb974d733a777db0e79d6440004aaa40750cd01bee42e4d200ec471edbdcb5e4da1f174e7509d

  • memory/1528-17-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/1528-18-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/1528-19-0x0000000001720000-0x00000000017E4000-memory.dmp

    Filesize

    784KB

  • memory/1528-25-0x0000000003050000-0x00000000031E3000-memory.dmp

    Filesize

    1.6MB

  • memory/1528-24-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/1528-34-0x00000000005A0000-0x000000000071F000-memory.dmp

    Filesize

    1.5MB

  • memory/1528-35-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/1540-3-0x0000000000120000-0x00000000001E4000-memory.dmp

    Filesize

    784KB

  • memory/1540-1-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/1540-15-0x0000000003080000-0x0000000003392000-memory.dmp

    Filesize

    3.1MB

  • memory/1540-0-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/1540-14-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB