Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 03:16
Behavioral task
behavioral1
Sample
bd87269d88c9657fe5bcf60dd7a9d4b8.exe
Resource
win7-20240220-en
General
-
Target
bd87269d88c9657fe5bcf60dd7a9d4b8.exe
-
Size
784KB
-
MD5
bd87269d88c9657fe5bcf60dd7a9d4b8
-
SHA1
7a4dd95776540b68e5b52962dc1ebfea853b81ac
-
SHA256
3260ab1946de346240779460fb50a711da687ddcc47b642f0ee3db089243da4e
-
SHA512
73b5ebd63dad3392ed046e8d962b7dbb2d3c7e8fb628affe944ed3e5f482ce148b570b42c8611392e19fa4c7ec7975bf802b951a6bbe896ed839b9c6fc04d18a
-
SSDEEP
12288:MAqKvzJMaFgKZ5lR/3HquYPLjoBGxkuZeR4l7MwAcT9f2MX+C2jtIzvD:Mw6y5lRfqXPnxJY4Nn9fbQ
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2768-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2768-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2712-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2712-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2712-25-0x0000000003000000-0x0000000003193000-memory.dmp xmrig behavioral1/memory/2712-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2712-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2712 bd87269d88c9657fe5bcf60dd7a9d4b8.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 bd87269d88c9657fe5bcf60dd7a9d4b8.exe -
Loads dropped DLL 1 IoCs
pid Process 2768 bd87269d88c9657fe5bcf60dd7a9d4b8.exe -
resource yara_rule behavioral1/memory/2768-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000b000000013a88-10.dat upx behavioral1/memory/2768-15-0x00000000031B0000-0x00000000034C2000-memory.dmp upx behavioral1/memory/2712-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2768 bd87269d88c9657fe5bcf60dd7a9d4b8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2768 bd87269d88c9657fe5bcf60dd7a9d4b8.exe 2712 bd87269d88c9657fe5bcf60dd7a9d4b8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2712 2768 bd87269d88c9657fe5bcf60dd7a9d4b8.exe 29 PID 2768 wrote to memory of 2712 2768 bd87269d88c9657fe5bcf60dd7a9d4b8.exe 29 PID 2768 wrote to memory of 2712 2768 bd87269d88c9657fe5bcf60dd7a9d4b8.exe 29 PID 2768 wrote to memory of 2712 2768 bd87269d88c9657fe5bcf60dd7a9d4b8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd87269d88c9657fe5bcf60dd7a9d4b8.exe"C:\Users\Admin\AppData\Local\Temp\bd87269d88c9657fe5bcf60dd7a9d4b8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\bd87269d88c9657fe5bcf60dd7a9d4b8.exeC:\Users\Admin\AppData\Local\Temp\bd87269d88c9657fe5bcf60dd7a9d4b8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2712
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD506a4d14966df579eb5aec813697d7ab1
SHA19fe61362502ec31cd59c05022cde10d20042d300
SHA2569a5a1b93a86cc1861814b06dd793e0d86a6efa4092c6649c4963cfa75fe5e5f1
SHA5127cd81fca0e2db4bbe0931e76d80d0269b61356ad5bd991b0dcd8fa176fec1d5ddd1d1833c5fc420eb81957c90a391661b2a050f4bea682df1ea189411e852a0e