Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 00:18
Behavioral task
behavioral1
Sample
ca008c9a57b89bb13616d682bfb8a87c.exe
Resource
win7-20240220-en
General
-
Target
ca008c9a57b89bb13616d682bfb8a87c.exe
-
Size
784KB
-
MD5
ca008c9a57b89bb13616d682bfb8a87c
-
SHA1
fb887e3d6f032dde01542cdbd3e4059e02e51336
-
SHA256
9ca0b091c5e4c48c3933654eab6c212602e56a0a6e5978f53cfebffa4d22918a
-
SHA512
6a14ad9501840844b25163e7cfad919fd3f4acc13d702d0705081595e639e16bb041acd1fb4c342153f0f270fc51da107003d3b2dea03ea58a4be03c4ad8fa8c
-
SSDEEP
12288:yf+iblHsaUhGsWfjSweVsWnXGvlfU4feFFsV8DR9sQtvcl1gE33aQb:yfhFagOptnilfXWbk8DR9fWl1l3pb
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/2040-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2040-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1332-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1332-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1332-27-0x00000000032B0000-0x0000000003443000-memory.dmp xmrig behavioral1/memory/1332-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1332 ca008c9a57b89bb13616d682bfb8a87c.exe -
Executes dropped EXE 1 IoCs
pid Process 1332 ca008c9a57b89bb13616d682bfb8a87c.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 ca008c9a57b89bb13616d682bfb8a87c.exe -
resource yara_rule behavioral1/memory/2040-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000c000000012253-10.dat upx behavioral1/memory/2040-14-0x00000000031E0000-0x00000000034F2000-memory.dmp upx behavioral1/memory/1332-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2040 ca008c9a57b89bb13616d682bfb8a87c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2040 ca008c9a57b89bb13616d682bfb8a87c.exe 1332 ca008c9a57b89bb13616d682bfb8a87c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1332 2040 ca008c9a57b89bb13616d682bfb8a87c.exe 29 PID 2040 wrote to memory of 1332 2040 ca008c9a57b89bb13616d682bfb8a87c.exe 29 PID 2040 wrote to memory of 1332 2040 ca008c9a57b89bb13616d682bfb8a87c.exe 29 PID 2040 wrote to memory of 1332 2040 ca008c9a57b89bb13616d682bfb8a87c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca008c9a57b89bb13616d682bfb8a87c.exe"C:\Users\Admin\AppData\Local\Temp\ca008c9a57b89bb13616d682bfb8a87c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\ca008c9a57b89bb13616d682bfb8a87c.exeC:\Users\Admin\AppData\Local\Temp\ca008c9a57b89bb13616d682bfb8a87c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD55d55d9ee7ea65ca84c1bc6fc0a3b0297
SHA1ac3e786229b6b61cc4a61990fad7a6f4010a544d
SHA256fe0ad6f0f90318114d73704d91d83b9940dc54845a0437bf0e7aa469a3f4887e
SHA5129730ed90d2e467f4b9b4d431b50cc48ee7ceb7c276c0e1986bcd6fdd6cd889a668b867ab5909ffbdbbb545098f15bb0c3533a608a45d7a51097af21941684d83