Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 11:11
Behavioral task
behavioral1
Sample
ddde2cbe8aecf74740d651d7fcc0bad4.exe
Resource
win7-20240221-en
General
-
Target
ddde2cbe8aecf74740d651d7fcc0bad4.exe
-
Size
1.5MB
-
MD5
ddde2cbe8aecf74740d651d7fcc0bad4
-
SHA1
42e3feb350c8c00631bade8cd2325c1e0e4abdb8
-
SHA256
f7c94d316662a7c43aa8d4177ee3f6bf34e54f68c1a0f185ab9366aa0596b89b
-
SHA512
4c103173b2aae3c6bd26159b5ff93934294eeb981492336499755b39d9bb07c571fbc2346ded9307825096602ffe231319c475478447a21643aa2678370174fb
-
SSDEEP
49152:mDG8k0gscDqWCJj9BAz1L9nSB4DaKg2AjwU:mDG8FBcDqW0Q5yi9AwU
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/3456-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3456-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4880-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4880-20-0x0000000005300000-0x0000000005493000-memory.dmp xmrig behavioral2/memory/4880-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4880-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/4880-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4880 ddde2cbe8aecf74740d651d7fcc0bad4.exe -
Executes dropped EXE 1 IoCs
pid Process 4880 ddde2cbe8aecf74740d651d7fcc0bad4.exe -
resource yara_rule behavioral2/memory/3456-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0008000000022745-11.dat upx behavioral2/memory/4880-12-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3456 ddde2cbe8aecf74740d651d7fcc0bad4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3456 ddde2cbe8aecf74740d651d7fcc0bad4.exe 4880 ddde2cbe8aecf74740d651d7fcc0bad4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3456 wrote to memory of 4880 3456 ddde2cbe8aecf74740d651d7fcc0bad4.exe 89 PID 3456 wrote to memory of 4880 3456 ddde2cbe8aecf74740d651d7fcc0bad4.exe 89 PID 3456 wrote to memory of 4880 3456 ddde2cbe8aecf74740d651d7fcc0bad4.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddde2cbe8aecf74740d651d7fcc0bad4.exe"C:\Users\Admin\AppData\Local\Temp\ddde2cbe8aecf74740d651d7fcc0bad4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\ddde2cbe8aecf74740d651d7fcc0bad4.exeC:\Users\Admin\AppData\Local\Temp\ddde2cbe8aecf74740d651d7fcc0bad4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4880
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5dc59af7abcfcf8e93f7edd4e751d0898
SHA14faaa46a5ecebb7c7174be9b1fa75022d0fb01f0
SHA25682636de316f6c4a14420313a4804af06b49719dd823df211a675b8ef1540b016
SHA512e658e061ba008c49c7e64ae7a34107df5e77a0f34e5349e6e3dde5a822d20d505697b97012e0227f15abd64c527a753fb59fd7cbf282622936560d11044b89a5