Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 14:50
Behavioral task
behavioral1
Sample
d66301d2053e3b84acf8a38e5b831ca2.exe
Resource
win7-20240221-en
General
-
Target
d66301d2053e3b84acf8a38e5b831ca2.exe
-
Size
784KB
-
MD5
d66301d2053e3b84acf8a38e5b831ca2
-
SHA1
9c995aa37af456082db2bd2d1bec735175c7bf57
-
SHA256
ced1546fb6026ac058be9927b7dcc7ebf67998a41c5338acdbf3da1bb12e487a
-
SHA512
21872d054eabe0141687b5eb5e17b41aba616fbe0a3d9e35936735e081dd0b8fd9cf437a9e414e040367be14d844d4f10969de1dd85c7c69a729ee24733edb6e
-
SSDEEP
12288:ulJnLR6Fl8yEaTFuS9olmRClZ3KFyD1Isl7lDG5Xg9yq37N22jmbFSHpKhlY:ulJLR6cylTgS9SmRGcFcpc5QXpts/
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/3024-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3024-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2908-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2908-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2908-27-0x0000000003220000-0x00000000033B3000-memory.dmp xmrig behavioral1/memory/2908-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2908 d66301d2053e3b84acf8a38e5b831ca2.exe -
Executes dropped EXE 1 IoCs
pid Process 2908 d66301d2053e3b84acf8a38e5b831ca2.exe -
Loads dropped DLL 1 IoCs
pid Process 3024 d66301d2053e3b84acf8a38e5b831ca2.exe -
resource yara_rule behavioral1/memory/3024-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000b00000001224e-10.dat upx behavioral1/memory/3024-15-0x00000000031B0000-0x00000000034C2000-memory.dmp upx behavioral1/memory/2908-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3024 d66301d2053e3b84acf8a38e5b831ca2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3024 d66301d2053e3b84acf8a38e5b831ca2.exe 2908 d66301d2053e3b84acf8a38e5b831ca2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2908 3024 d66301d2053e3b84acf8a38e5b831ca2.exe 29 PID 3024 wrote to memory of 2908 3024 d66301d2053e3b84acf8a38e5b831ca2.exe 29 PID 3024 wrote to memory of 2908 3024 d66301d2053e3b84acf8a38e5b831ca2.exe 29 PID 3024 wrote to memory of 2908 3024 d66301d2053e3b84acf8a38e5b831ca2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d66301d2053e3b84acf8a38e5b831ca2.exe"C:\Users\Admin\AppData\Local\Temp\d66301d2053e3b84acf8a38e5b831ca2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\d66301d2053e3b84acf8a38e5b831ca2.exeC:\Users\Admin\AppData\Local\Temp\d66301d2053e3b84acf8a38e5b831ca2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2908
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5df667da5b6ee31a9f82b583e67bb3ab5
SHA18c78da7ce9a1481438125192ecebe417b81dd23a
SHA2569ecc5c484ca5ab44d381b480b654140850b41bfec9001e8e782e7160cc233011
SHA51221441914f7696d7f96c91b9bb7a2f5a44de7e0746fefa1de7672f917a9b2e3528baec5b1a1f46c191ee0d856c954b933a27352876dff96994c9bb37f5ea2c94f