Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 15:00
Behavioral task
behavioral1
Sample
bee7ed86375757cbee1572286fa8df67.exe
Resource
win7-20240221-en
General
-
Target
bee7ed86375757cbee1572286fa8df67.exe
-
Size
784KB
-
MD5
bee7ed86375757cbee1572286fa8df67
-
SHA1
77835c7c289298ee7b1b48edea53ffe72a83a0c5
-
SHA256
a5a79a8b6c39c9c534929b0066b0028455f24f7449d5c07f856029afdb41ec82
-
SHA512
f64af548ab3a5a705be801c2f6e48cca375aac376ab5c19211e63ac2c2bec4704f4f9b0b5ec333a8387abf6ab73c0e38d1c710a05d1ff95bbe061156daf810d6
-
SSDEEP
12288:n+8D3gNnsLWvDI7XdZwCoHhBFRICe7dAuNK+Sc7f02VkB+4eVTSkJv:+zYRboDFRIrAuuig+4L6
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1152-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1152-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1428-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1428-21-0x00000000053D0000-0x0000000005563000-memory.dmp xmrig behavioral2/memory/1428-22-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1428-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1428 bee7ed86375757cbee1572286fa8df67.exe -
Executes dropped EXE 1 IoCs
pid Process 1428 bee7ed86375757cbee1572286fa8df67.exe -
resource yara_rule behavioral2/memory/1152-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023227-12.dat upx behavioral2/memory/1428-14-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1152 bee7ed86375757cbee1572286fa8df67.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1152 bee7ed86375757cbee1572286fa8df67.exe 1428 bee7ed86375757cbee1572286fa8df67.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1428 1152 bee7ed86375757cbee1572286fa8df67.exe 91 PID 1152 wrote to memory of 1428 1152 bee7ed86375757cbee1572286fa8df67.exe 91 PID 1152 wrote to memory of 1428 1152 bee7ed86375757cbee1572286fa8df67.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bee7ed86375757cbee1572286fa8df67.exe"C:\Users\Admin\AppData\Local\Temp\bee7ed86375757cbee1572286fa8df67.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\bee7ed86375757cbee1572286fa8df67.exeC:\Users\Admin\AppData\Local\Temp\bee7ed86375757cbee1572286fa8df67.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1428
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD53eb352f9950d2ca4c89ef6823662a9e2
SHA18a9f8ad86ca978a643e07fef9f945e67c2cc4602
SHA2561b08f19f524ff0dda3abbcf2c56aed5b27f7a0e40589bcd0c77119887aeaa3e6
SHA512f23cd219320a03016fef6b15d3a69f8a48446f6cb282f37bb9eda342af6204c4961c1bf8f8b8782cc774845e1bfc7aa9239053e4980b2a326d3b78f58a162e06