Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 23:17
Behavioral task
behavioral1
Sample
cc816ce21e38d9bb92c2ee7171debe9c.exe
Resource
win7-20240215-en
General
-
Target
cc816ce21e38d9bb92c2ee7171debe9c.exe
-
Size
784KB
-
MD5
cc816ce21e38d9bb92c2ee7171debe9c
-
SHA1
18a0072ab3d48f238bf93cb319d3f39f8b0b7c19
-
SHA256
8c4cde1930ed1c8f290ac83a60dcdac35ed59a0fb9990e49b83386214a0690e2
-
SHA512
0d01d391e0abbb33dee36b35483c2df7f91454f4bcb1df64788616197a2e2f5c6ad65b2e8317804092c73f40209bbd6f3c2515ea8523135a20e0af613ec91ff7
-
SSDEEP
24576:MoAuNeZ1c1YrU4tsde8zKXZmrH0B73fXGuV:MoAuN4cAyefXUbQ3f
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/1304-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1304-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2228-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2228-25-0x0000000003200000-0x0000000003393000-memory.dmp xmrig behavioral1/memory/2228-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2228-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2228 cc816ce21e38d9bb92c2ee7171debe9c.exe -
Executes dropped EXE 1 IoCs
pid Process 2228 cc816ce21e38d9bb92c2ee7171debe9c.exe -
Loads dropped DLL 1 IoCs
pid Process 1304 cc816ce21e38d9bb92c2ee7171debe9c.exe -
resource yara_rule behavioral1/memory/1304-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x00090000000122be-10.dat upx behavioral1/memory/1304-15-0x00000000031B0000-0x00000000034C2000-memory.dmp upx behavioral1/memory/2228-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1304 cc816ce21e38d9bb92c2ee7171debe9c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1304 cc816ce21e38d9bb92c2ee7171debe9c.exe 2228 cc816ce21e38d9bb92c2ee7171debe9c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2228 1304 cc816ce21e38d9bb92c2ee7171debe9c.exe 29 PID 1304 wrote to memory of 2228 1304 cc816ce21e38d9bb92c2ee7171debe9c.exe 29 PID 1304 wrote to memory of 2228 1304 cc816ce21e38d9bb92c2ee7171debe9c.exe 29 PID 1304 wrote to memory of 2228 1304 cc816ce21e38d9bb92c2ee7171debe9c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc816ce21e38d9bb92c2ee7171debe9c.exe"C:\Users\Admin\AppData\Local\Temp\cc816ce21e38d9bb92c2ee7171debe9c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\cc816ce21e38d9bb92c2ee7171debe9c.exeC:\Users\Admin\AppData\Local\Temp\cc816ce21e38d9bb92c2ee7171debe9c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2228
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5228bb8f7d320d8b4a2834798a173bec3
SHA1ae5174d96c3524db6226fd192a50897e79ad3c5d
SHA25676dd86edb0ca7f6a8fd94e306a0aa4acaeb3b02a18740f52a3edbf5eb8a817a2
SHA5123e1bd3306d1abd8b81cae1ec986bd88809726582c0475d25d20e600ced8778c5a12de400ab9fa0f2bd4cea38763ae5ac4651920c54344da3b951b930da895067