Analysis
-
max time kernel
15s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2024, 23:05
Behavioral task
behavioral1
Sample
8ad18e190e880579c8d2ff13d7030ca36c9ba45d947077f759c584fe37025c87.exe
Resource
win7-20240221-en
General
-
Target
8ad18e190e880579c8d2ff13d7030ca36c9ba45d947077f759c584fe37025c87.exe
-
Size
2.1MB
-
MD5
3d5c814a79506381e6f9ed48d1b60654
-
SHA1
785d58ccc9d5b6c0edaec139f110a8e18e7225f1
-
SHA256
8ad18e190e880579c8d2ff13d7030ca36c9ba45d947077f759c584fe37025c87
-
SHA512
195fd2600c0047fec1fb2dcf7a03decbb1a8fdadec6b95a78e5f3cf0858aa4ce71bfafe8c6367f99143ad8d11d6ac924873ca8d0d1977d266aa11b9250a7143c
-
SSDEEP
49152:BezaTF8FcNkNdfE0pZ9ozt4wISK9XIXkq+xk:BemTLkNdfE0pZrw
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/files/0x000700000002301d-6.dat UPX behavioral2/files/0x00070000000231dc-20.dat UPX -
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/4652-0-0x00007FF748790000-0x00007FF748AE4000-memory.dmp xmrig behavioral2/files/0x000700000002301d-6.dat xmrig behavioral2/files/0x00070000000231dc-20.dat xmrig behavioral2/memory/1232-74-0x00007FF7109C0000-0x00007FF710D14000-memory.dmp xmrig behavioral2/files/0x00070000000231ee-98.dat xmrig behavioral2/files/0x00070000000231ef-99.dat xmrig behavioral2/files/0x00070000000231f4-137.dat xmrig -
resource yara_rule behavioral2/memory/4652-0-0x00007FF748790000-0x00007FF748AE4000-memory.dmp upx behavioral2/files/0x000700000002301d-6.dat upx behavioral2/files/0x00070000000231dc-20.dat upx behavioral2/memory/1232-74-0x00007FF7109C0000-0x00007FF710D14000-memory.dmp upx behavioral2/files/0x00070000000231ee-98.dat upx behavioral2/files/0x00070000000231ef-99.dat upx behavioral2/files/0x00070000000231f4-137.dat upx behavioral2/memory/3772-186-0x00007FF6C8330000-0x00007FF6C8684000-memory.dmp upx behavioral2/memory/224-639-0x00007FF715780000-0x00007FF715AD4000-memory.dmp upx behavioral2/memory/1564-642-0x00007FF670010000-0x00007FF670364000-memory.dmp upx behavioral2/memory/3940-646-0x00007FF63C9D0000-0x00007FF63CD24000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ad18e190e880579c8d2ff13d7030ca36c9ba45d947077f759c584fe37025c87.exe"C:\Users\Admin\AppData\Local\Temp\8ad18e190e880579c8d2ff13d7030ca36c9ba45d947077f759c584fe37025c87.exe"1⤵PID:4652
-
C:\Windows\System\uYMwdIu.exeC:\Windows\System\uYMwdIu.exe2⤵PID:408
-
-
C:\Windows\System\NtxjEpI.exeC:\Windows\System\NtxjEpI.exe2⤵PID:1232
-
-
C:\Windows\System\sOhiHRy.exeC:\Windows\System\sOhiHRy.exe2⤵PID:4860
-
-
C:\Windows\System\HVXdxsv.exeC:\Windows\System\HVXdxsv.exe2⤵PID:3828
-
-
C:\Windows\System\yqGnWzV.exeC:\Windows\System\yqGnWzV.exe2⤵PID:5068
-
-
C:\Windows\System\lGdvTLo.exeC:\Windows\System\lGdvTLo.exe2⤵PID:3968
-
-
C:\Windows\System\wAAeyzh.exeC:\Windows\System\wAAeyzh.exe2⤵PID:5632
-
-
C:\Windows\System\kqTpAlj.exeC:\Windows\System\kqTpAlj.exe2⤵PID:6212
-
-
C:\Windows\System\vmmmUav.exeC:\Windows\System\vmmmUav.exe2⤵PID:7204
-
-
C:\Windows\System\EkgvSTX.exeC:\Windows\System\EkgvSTX.exe2⤵PID:7392
-
-
C:\Windows\System\JxnCiLm.exeC:\Windows\System\JxnCiLm.exe2⤵PID:7412
-
-
C:\Windows\System\PnOjYTB.exeC:\Windows\System\PnOjYTB.exe2⤵PID:9236
-
-
C:\Windows\System\lDlzAcP.exeC:\Windows\System\lDlzAcP.exe2⤵PID:11532
-
-
C:\Windows\System\tNoOXOO.exeC:\Windows\System\tNoOXOO.exe2⤵PID:11548
-
-
C:\Windows\System\hOwJqKK.exeC:\Windows\System\hOwJqKK.exe2⤵PID:13780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD5180ec18cff675908ea09fb02b8edeae7
SHA1908a0fde6e66598e819044f800d2fb12a2c2d5e4
SHA25635e0571c2720559fc2e392ef1ac01a4890a7f5a52de790fe0560ba1ddb8b0978
SHA512f4efca4f8c80307ac309f06271cca1b553bd93330b442aaa71749f3ce5f3d47dab778dbee66162c088762bb8f4726a65ed8e5313f9bd8da09d951b910b9f8e49
-
Filesize
832KB
MD5fe23d8f2a683ea3c37e211db5c47c198
SHA1c8d98757080f758fa71fe2947f967f4c2ba26b77
SHA256e791fb8dbe7f5a7d384dc32653c49cf355982fbc2394ea1e3030cd6ebb798cb8
SHA512ff5ab31bffe4dcd555455f3d81b2d9fca6cd687b604f37f4aa99e780677c84919321fd43b5fd13f9cb6081978b182fef58c2564f773d39cf2fefe33142ce3656
-
Filesize
1.6MB
MD577efd040a9ea34bee863950e3be566f2
SHA12406862911b876c1b7f1e0cebd8d92fa67fc33de
SHA2563322497c878b28c1e663f5c0a9d383a1b8ccc169f51d77a087193bea374c54e3
SHA512dd136d90b8b85900b87952fce28b5811607a123d1d53b7e19957b59eb3e8d8bff733bbb52e7b5bd7226cd4c2a1f50c6a4572a459f8408961a64a2e721e044aff
-
Filesize
704KB
MD527f1ae58c0e7ea96c463a8f0329d13e3
SHA1a5352f33f2a7ec676e07aa36bd587f2a910b1502
SHA256570ef729e78067f9e824a09ee84a0b44c24671dfe07947eaca970f453f235334
SHA51251c2e61154a9cf7b8c51728bee23d084e40467a64fc74544ed07917de5c42cd2c4f093dc4dba57e475be140334b7f9d2f8c2784d353f9bec4fe5fc6098f5ad70
-
Filesize
2.1MB
MD5c659dbc0b3fe9aceaab7ff72192f78f7
SHA1fd704dfe0525411a892fa18abcab3d5bb3100660
SHA256a0a2fca61bbac3f4f74d0a887b6d9a2432f7fcd26b47036c251d228c34335b45
SHA512b8e7aba0c80fa68442367cd90531af1f004218bb58fb13168620712d84d267fc87221a3e51e5c5da562ac0c38d5692b8fa36e35fd5f54fb74cfef48a9e88997a