Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 03:16
Behavioral task
behavioral1
Sample
bd87269d88c9657fe5bcf60dd7a9d4b8.exe
Resource
win7-20240220-en
General
-
Target
bd87269d88c9657fe5bcf60dd7a9d4b8.exe
-
Size
784KB
-
MD5
bd87269d88c9657fe5bcf60dd7a9d4b8
-
SHA1
7a4dd95776540b68e5b52962dc1ebfea853b81ac
-
SHA256
3260ab1946de346240779460fb50a711da687ddcc47b642f0ee3db089243da4e
-
SHA512
73b5ebd63dad3392ed046e8d962b7dbb2d3c7e8fb628affe944ed3e5f482ce148b570b42c8611392e19fa4c7ec7975bf802b951a6bbe896ed839b9c6fc04d18a
-
SSDEEP
12288:MAqKvzJMaFgKZ5lR/3HquYPLjoBGxkuZeR4l7MwAcT9f2MX+C2jtIzvD:Mw6y5lRfqXPnxJY4Nn9fbQ
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4796-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4796-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1780-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1780-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1780-20-0x0000000005490000-0x0000000005623000-memory.dmp xmrig behavioral2/memory/1780-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1780 bd87269d88c9657fe5bcf60dd7a9d4b8.exe -
Executes dropped EXE 1 IoCs
pid Process 1780 bd87269d88c9657fe5bcf60dd7a9d4b8.exe -
resource yara_rule behavioral2/memory/4796-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0011000000023134-11.dat upx behavioral2/memory/1780-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4796 bd87269d88c9657fe5bcf60dd7a9d4b8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4796 bd87269d88c9657fe5bcf60dd7a9d4b8.exe 1780 bd87269d88c9657fe5bcf60dd7a9d4b8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 1780 4796 bd87269d88c9657fe5bcf60dd7a9d4b8.exe 89 PID 4796 wrote to memory of 1780 4796 bd87269d88c9657fe5bcf60dd7a9d4b8.exe 89 PID 4796 wrote to memory of 1780 4796 bd87269d88c9657fe5bcf60dd7a9d4b8.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd87269d88c9657fe5bcf60dd7a9d4b8.exe"C:\Users\Admin\AppData\Local\Temp\bd87269d88c9657fe5bcf60dd7a9d4b8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\bd87269d88c9657fe5bcf60dd7a9d4b8.exeC:\Users\Admin\AppData\Local\Temp\bd87269d88c9657fe5bcf60dd7a9d4b8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD59cda37fc5c522edf3a9d3271fead8761
SHA1c3874a6664c60a1ffe1c7d93de9db2c74e450070
SHA256d1cc6a7705222e61a9146d26d9244d70ec75ab4acb5c584cdd462c4faa93debe
SHA5120468dc519cc0dbbf2efd616bde6cff13298ee0c3114109e7c6e69f94faddb7d09f399044b7875dd56dce5314e084132cf55ae81059706c0c92115a04355b3636