Analysis
-
max time kernel
136s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 23:17
Behavioral task
behavioral1
Sample
cc816ce21e38d9bb92c2ee7171debe9c.exe
Resource
win7-20240215-en
General
-
Target
cc816ce21e38d9bb92c2ee7171debe9c.exe
-
Size
784KB
-
MD5
cc816ce21e38d9bb92c2ee7171debe9c
-
SHA1
18a0072ab3d48f238bf93cb319d3f39f8b0b7c19
-
SHA256
8c4cde1930ed1c8f290ac83a60dcdac35ed59a0fb9990e49b83386214a0690e2
-
SHA512
0d01d391e0abbb33dee36b35483c2df7f91454f4bcb1df64788616197a2e2f5c6ad65b2e8317804092c73f40209bbd6f3c2515ea8523135a20e0af613ec91ff7
-
SSDEEP
24576:MoAuNeZ1c1YrU4tsde8zKXZmrH0B73fXGuV:MoAuN4cAyefXUbQ3f
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/3160-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3160-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4972-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4972-20-0x0000000005330000-0x00000000054C3000-memory.dmp xmrig behavioral2/memory/4972-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4972-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/4972-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4972 cc816ce21e38d9bb92c2ee7171debe9c.exe -
Executes dropped EXE 1 IoCs
pid Process 4972 cc816ce21e38d9bb92c2ee7171debe9c.exe -
resource yara_rule behavioral2/memory/3160-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023250-11.dat upx behavioral2/memory/4972-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3160 cc816ce21e38d9bb92c2ee7171debe9c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3160 cc816ce21e38d9bb92c2ee7171debe9c.exe 4972 cc816ce21e38d9bb92c2ee7171debe9c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3160 wrote to memory of 4972 3160 cc816ce21e38d9bb92c2ee7171debe9c.exe 100 PID 3160 wrote to memory of 4972 3160 cc816ce21e38d9bb92c2ee7171debe9c.exe 100 PID 3160 wrote to memory of 4972 3160 cc816ce21e38d9bb92c2ee7171debe9c.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc816ce21e38d9bb92c2ee7171debe9c.exe"C:\Users\Admin\AppData\Local\Temp\cc816ce21e38d9bb92c2ee7171debe9c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\cc816ce21e38d9bb92c2ee7171debe9c.exeC:\Users\Admin\AppData\Local\Temp\cc816ce21e38d9bb92c2ee7171debe9c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3692 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:2816
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5131901dd403518d067619fa4ac62240e
SHA16be0200a1118c967a779bd5df1286a0d913c43d4
SHA25618eaba3a0a820b848740d8754d12bde2fd1c744cc3b336193d3f0f0e13131bee
SHA5126efc9032f508de46049b4731d524d88215c56f678e89a5894466e401e363916ea297650b938369c8e90349409ddad6afe30b63a3299ad8722cd18adab5dd83a5