Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 08:04
Behavioral task
behavioral1
Sample
e12df8575bb9020132168fff43ef944c.exe
Resource
win7-20240221-en
General
-
Target
e12df8575bb9020132168fff43ef944c.exe
-
Size
784KB
-
MD5
e12df8575bb9020132168fff43ef944c
-
SHA1
ef45f086c51045ca528e80c0cf6d6be7d4b2d29a
-
SHA256
a2635c452d0d76f137a73a174e5fb69563753df09287006116578591824f9c87
-
SHA512
e726a3f4a726fd4f92cbf991988e93dad0406f52cf23e50eb1d2e661d74a196f07e347c5145aca451bbcbec8cb574df1c4dd6d7dce35d1fe42b6aea70d81ea9d
-
SSDEEP
12288:n1AloMXbMjso8ur6qIdX6e0l7Em2/yhgks5SmzDQjymHHAiF:nqeMwQqIdX6e0lGv2mz0jymn9F
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/612-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/612-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1724-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1724-25-0x0000000003150000-0x00000000032E3000-memory.dmp xmrig behavioral1/memory/1724-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1724-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1724 e12df8575bb9020132168fff43ef944c.exe -
Executes dropped EXE 1 IoCs
pid Process 1724 e12df8575bb9020132168fff43ef944c.exe -
Loads dropped DLL 1 IoCs
pid Process 612 e12df8575bb9020132168fff43ef944c.exe -
resource yara_rule behavioral1/memory/612-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000b00000001224c-10.dat upx behavioral1/memory/612-15-0x0000000003250000-0x0000000003562000-memory.dmp upx behavioral1/files/0x000b00000001224c-16.dat upx behavioral1/memory/1724-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 612 e12df8575bb9020132168fff43ef944c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 612 e12df8575bb9020132168fff43ef944c.exe 1724 e12df8575bb9020132168fff43ef944c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 612 wrote to memory of 1724 612 e12df8575bb9020132168fff43ef944c.exe 29 PID 612 wrote to memory of 1724 612 e12df8575bb9020132168fff43ef944c.exe 29 PID 612 wrote to memory of 1724 612 e12df8575bb9020132168fff43ef944c.exe 29 PID 612 wrote to memory of 1724 612 e12df8575bb9020132168fff43ef944c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e12df8575bb9020132168fff43ef944c.exe"C:\Users\Admin\AppData\Local\Temp\e12df8575bb9020132168fff43ef944c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Users\Admin\AppData\Local\Temp\e12df8575bb9020132168fff43ef944c.exeC:\Users\Admin\AppData\Local\Temp\e12df8575bb9020132168fff43ef944c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1724
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD55f2c9eba0193f0110da4208bd4c94cd1
SHA1f83e1be723c270950e1e7c54a0ca3eabc02aa6fc
SHA2566f50864bc23537ba63ba27dda6ed56f6987daca5425dce29f3fe7c0d7747aad2
SHA51268533fbabde42eb8b28a1e5b74a8696bf3d3be3b38c0ea5b43fa601b4bc19bd6f8a5b5f4f6243e8ea393dd207a11dabc2ab61c034fc5da698a7a68c4448d6c85
-
Filesize
400KB
MD5c2cd98ed7da24425ae79762fa42c92c4
SHA120fe68c14bc92147a78c77fb221876496856dfc4
SHA2565581b8f1239f008ebe93cabe80e8ca8cb4477856bac3a7b8d557db014837978c
SHA512b2fd785831eb6261fda9ef2e1efd96689d9fc9d1452f4880433bb617c6e28033947bd2df12049bbd0ac3a6b60a58a0094116cb995202faf099f9204f6061d99b