Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 00:16
Behavioral task
behavioral1
Sample
d4bada9429472ca6f5fe9053c4589b1d.exe
Resource
win7-20240215-en
General
-
Target
d4bada9429472ca6f5fe9053c4589b1d.exe
-
Size
784KB
-
MD5
d4bada9429472ca6f5fe9053c4589b1d
-
SHA1
7ae2183394a6c42abe0cf7dcd299640e6333070b
-
SHA256
e6e91d467b069fc8f3a8a429f5a614692282b2707109d808b05eee37158fb52d
-
SHA512
ada5bd64db07ca5be9e9b7b2305ae47b61a81a0c28033a29b2fe9fb7ccc132820f704647632e5001023605eb4cc8eabb31c3ec50f3b26c136dea52cf1a181f43
-
SSDEEP
24576:rmNJca/1XplAiGSx2j59RQLyKodWpLYkUSOqf:S71Xpl4fj5gLue8kUSv
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/5996-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/5996-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1556-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1556-21-0x00000000053B0000-0x0000000005543000-memory.dmp xmrig behavioral2/memory/1556-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1556-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1556-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1556 d4bada9429472ca6f5fe9053c4589b1d.exe -
Executes dropped EXE 1 IoCs
pid Process 1556 d4bada9429472ca6f5fe9053c4589b1d.exe -
resource yara_rule behavioral2/memory/5996-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000f000000023124-11.dat upx behavioral2/memory/1556-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5996 d4bada9429472ca6f5fe9053c4589b1d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5996 d4bada9429472ca6f5fe9053c4589b1d.exe 1556 d4bada9429472ca6f5fe9053c4589b1d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5996 wrote to memory of 1556 5996 d4bada9429472ca6f5fe9053c4589b1d.exe 90 PID 5996 wrote to memory of 1556 5996 d4bada9429472ca6f5fe9053c4589b1d.exe 90 PID 5996 wrote to memory of 1556 5996 d4bada9429472ca6f5fe9053c4589b1d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4bada9429472ca6f5fe9053c4589b1d.exe"C:\Users\Admin\AppData\Local\Temp\d4bada9429472ca6f5fe9053c4589b1d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5996 -
C:\Users\Admin\AppData\Local\Temp\d4bada9429472ca6f5fe9053c4589b1d.exeC:\Users\Admin\AppData\Local\Temp\d4bada9429472ca6f5fe9053c4589b1d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1556
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5b46a7a9065191f0d2b45c2445997b81a
SHA115aa7a93877a2002d652121f356fda9751eacd1f
SHA256f29c5f0461b48d331738da369cf4e1f164e99ba17e3cbb6477cd0af6f2707731
SHA5127cd6553ea651b6875a088039b260aa23a920aed4c5c4cec3f9d6ee00234a5a0138b656b31d8904b082aa0e54ed21baa81655ca57c958b5de5a8f0f768f340cfe