Analysis
-
max time kernel
17s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 01:55
Behavioral task
behavioral1
Sample
be1f20cdf4c0f40ddece8c69f8aa982802787f9b4054180372b643e1b1bd1c85.exe
Resource
win7-20240215-en
General
-
Target
be1f20cdf4c0f40ddece8c69f8aa982802787f9b4054180372b643e1b1bd1c85.exe
-
Size
2.1MB
-
MD5
170f4a0d5560185d2a4718207c1f2e00
-
SHA1
b860d3a33aec6a13fbba8f6d49018de3b92e756e
-
SHA256
be1f20cdf4c0f40ddece8c69f8aa982802787f9b4054180372b643e1b1bd1c85
-
SHA512
5970f9a76d5c19e90ca703ba3826be93fc4629e7872dd1a1b7ae5f28a0df6aecd02be23a5f4639b20bfe670fcddcb9d86c47ef98a575afb4d35149f8513048b6
-
SSDEEP
49152:BezaTF8FcNkNdfE0pZ9ozt4wISK9XIXkwa:BemTLkNdfE0pZrF
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/files/0x0007000000023221-20.dat UPX behavioral2/files/0x000700000002322c-68.dat UPX behavioral2/files/0x0007000000023237-132.dat UPX behavioral2/files/0x0007000000023244-191.dat UPX -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/3600-0-0x00007FF749050000-0x00007FF7493A4000-memory.dmp xmrig behavioral2/files/0x0007000000023221-20.dat xmrig behavioral2/files/0x000700000002322c-68.dat xmrig behavioral2/files/0x0007000000023237-132.dat xmrig behavioral2/files/0x0007000000023244-191.dat xmrig behavioral2/memory/1708-633-0x00007FF78A070000-0x00007FF78A3C4000-memory.dmp xmrig behavioral2/memory/3192-636-0x00007FF648D50000-0x00007FF6490A4000-memory.dmp xmrig behavioral2/memory/1544-638-0x00007FF6DD510000-0x00007FF6DD864000-memory.dmp xmrig behavioral2/memory/3340-641-0x00007FF72B7C0000-0x00007FF72BB14000-memory.dmp xmrig behavioral2/memory/4336-645-0x00007FF773CE0000-0x00007FF774034000-memory.dmp xmrig behavioral2/memory/1876-1524-0x00007FF6F61D0000-0x00007FF6F6524000-memory.dmp xmrig behavioral2/memory/744-1473-0x00007FF683B70000-0x00007FF683EC4000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/3600-0-0x00007FF749050000-0x00007FF7493A4000-memory.dmp upx behavioral2/files/0x0007000000023221-20.dat upx behavioral2/files/0x000700000002322c-68.dat upx behavioral2/files/0x0007000000023237-132.dat upx behavioral2/files/0x0007000000023244-191.dat upx behavioral2/memory/1708-633-0x00007FF78A070000-0x00007FF78A3C4000-memory.dmp upx behavioral2/memory/3192-636-0x00007FF648D50000-0x00007FF6490A4000-memory.dmp upx behavioral2/memory/1544-638-0x00007FF6DD510000-0x00007FF6DD864000-memory.dmp upx behavioral2/memory/3340-641-0x00007FF72B7C0000-0x00007FF72BB14000-memory.dmp upx behavioral2/memory/4336-645-0x00007FF773CE0000-0x00007FF774034000-memory.dmp upx behavioral2/memory/1876-1524-0x00007FF6F61D0000-0x00007FF6F6524000-memory.dmp upx behavioral2/memory/744-1473-0x00007FF683B70000-0x00007FF683EC4000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\be1f20cdf4c0f40ddece8c69f8aa982802787f9b4054180372b643e1b1bd1c85.exe"C:\Users\Admin\AppData\Local\Temp\be1f20cdf4c0f40ddece8c69f8aa982802787f9b4054180372b643e1b1bd1c85.exe"1⤵PID:3600
-
C:\Windows\System\nzuutyB.exeC:\Windows\System\nzuutyB.exe2⤵PID:2628
-
-
C:\Windows\System\CkAhfsi.exeC:\Windows\System\CkAhfsi.exe2⤵PID:1512
-
-
C:\Windows\System\nCsSTnw.exeC:\Windows\System\nCsSTnw.exe2⤵PID:4860
-
-
C:\Windows\System\kyMfLyM.exeC:\Windows\System\kyMfLyM.exe2⤵PID:3472
-
-
C:\Windows\System\ExGMnMF.exeC:\Windows\System\ExGMnMF.exe2⤵PID:2348
-
-
C:\Windows\System\qKKwXPP.exeC:\Windows\System\qKKwXPP.exe2⤵PID:4404
-
-
C:\Windows\System\ZemKRbS.exeC:\Windows\System\ZemKRbS.exe2⤵PID:2500
-
-
C:\Windows\System\tDinuVm.exeC:\Windows\System\tDinuVm.exe2⤵PID:712
-
-
C:\Windows\System\fuPpQrR.exeC:\Windows\System\fuPpQrR.exe2⤵PID:2400
-
-
C:\Windows\System\VGFBwYg.exeC:\Windows\System\VGFBwYg.exe2⤵PID:2268
-
-
C:\Windows\System\ZcRxiZi.exeC:\Windows\System\ZcRxiZi.exe2⤵PID:4304
-
-
C:\Windows\System\oEnqgFe.exeC:\Windows\System\oEnqgFe.exe2⤵PID:3836
-
-
C:\Windows\System\qJjrAIk.exeC:\Windows\System\qJjrAIk.exe2⤵PID:7116
-
-
C:\Windows\System\pFoPFxo.exeC:\Windows\System\pFoPFxo.exe2⤵PID:7504
-
-
C:\Windows\System\aHxAtiv.exeC:\Windows\System\aHxAtiv.exe2⤵PID:7520
-
-
C:\Windows\System\VFpihpB.exeC:\Windows\System\VFpihpB.exe2⤵PID:10476
-
-
C:\Windows\System\siOvyCx.exeC:\Windows\System\siOvyCx.exe2⤵PID:12624
-
-
C:\Windows\System\tTbfkFj.exeC:\Windows\System\tTbfkFj.exe2⤵PID:6416
-
-
C:\Windows\System\nKQNkCl.exeC:\Windows\System\nKQNkCl.exe2⤵PID:13988
-
-
C:\Windows\System\OKRUsWl.exeC:\Windows\System\OKRUsWl.exe2⤵PID:14004
-
-
C:\Windows\System\DvoTDEc.exeC:\Windows\System\DvoTDEc.exe2⤵PID:14024
-
-
C:\Windows\System\pGXECLG.exeC:\Windows\System\pGXECLG.exe2⤵PID:14040
-
-
C:\Windows\System\CDEmOAD.exeC:\Windows\System\CDEmOAD.exe2⤵PID:14060
-
-
C:\Windows\System\zhwNgGg.exeC:\Windows\System\zhwNgGg.exe2⤵PID:14076
-
-
C:\Windows\System\hCshgQR.exeC:\Windows\System\hCshgQR.exe2⤵PID:14092
-
-
C:\Windows\System\pZwiBzk.exeC:\Windows\System\pZwiBzk.exe2⤵PID:14112
-
-
C:\Windows\System\MkUhoEP.exeC:\Windows\System\MkUhoEP.exe2⤵PID:14128
-
-
C:\Windows\System\Dytpult.exeC:\Windows\System\Dytpult.exe2⤵PID:14144
-
-
C:\Windows\System\LgRYnAu.exeC:\Windows\System\LgRYnAu.exe2⤵PID:14164
-
-
C:\Windows\System\kWzNkhD.exeC:\Windows\System\kWzNkhD.exe2⤵PID:14180
-
-
C:\Windows\System\asXIntQ.exeC:\Windows\System\asXIntQ.exe2⤵PID:14200
-
-
C:\Windows\System\vQEQXOC.exeC:\Windows\System\vQEQXOC.exe2⤵PID:14216
-
-
C:\Windows\System\VsSdgkh.exeC:\Windows\System\VsSdgkh.exe2⤵PID:12600
-
-
C:\Windows\System\cwezJJw.exeC:\Windows\System\cwezJJw.exe2⤵PID:7516
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD51f57363995a71f8806a52e5b1198c7b1
SHA1e94035f89e5d71eac26310762a633ab477c83061
SHA256d406226d948eeb29c2fdc783543f1d215b8966780f61f19cb9fc8a42ebad35f2
SHA512cdb700f1c9452f2a3524a61ba2bd831f6ecc37b81c5c71bb840b5d7649c63be5a34bc0c51384d1651ee03f255cea38516e2e91956b3e73444a6a63a21f4e9d6a
-
Filesize
2.0MB
MD575d8ad6bd04d19e28dc65e3de3a04310
SHA1521643bc00380ac3b5421f62ca80d1bb8f7adfe0
SHA2560701d7d910a47d46410a57513b2e21d3cf286d5d53584e2e90e846a537100088
SHA5120e75c7f0ae70d5f90070474d180d8f44bb03dd59d7a1b569b084261c5d07054b599b299b89f9af209dbaa084c81cdec30a04a1eee57030261bce21318a6d8f34
-
Filesize
1.8MB
MD5a4d9d94cb3c4f57a1d643c77116f3627
SHA1d7c89f254bc76d6fb9bb23748d71e2f54c4a4191
SHA25635848d2eb57e120adb20a6171c63ede010632a0c2ce117bfa9fbf6be2c2b7781
SHA5129e58bfd802b3c7fe4d90b623666632d8f3961f505fab3dd8597ae2af51195c423016be6a4627a74f6980ee4e49f9aa48168217afa03be90c0c47ebf07f1f91a2
-
Filesize
1.4MB
MD51f06fce3af22a65ef5b2635f52d088c3
SHA184f44bc82889b9f54baf504bedbd4204dc5a981d
SHA256371798fc53dbfb5963ba95ba4967571909995063b9eff1e6314533b20e574745
SHA512a990dc6f2435079a0cf1fd8864a26fe7cc8666b2ce869d2411acc757cbfc60476873cf2d02886de20dd089f253e486a216f69899336556e63e8ebeeea812fa0d