Analysis

  • max time kernel
    18s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 04:59

General

  • Target

    bf80f63c2622d84f1eb12031521e232193c38e0b9fb6d0ac0919b8de8f0241db.exe

  • Size

    3.1MB

  • MD5

    a6dd2148993cc41611ff86c1d2d98835

  • SHA1

    c6508eb18f49b876443d522fa5843e99a8235a43

  • SHA256

    bf80f63c2622d84f1eb12031521e232193c38e0b9fb6d0ac0919b8de8f0241db

  • SHA512

    6175da213b23e9f5e335dcfb87f0e7d9397055bb11a7789030300681ccaff88b4faf10b8ee3dd3b9b70cd7d7f95eb62846f1071db7729c906c2d7c702bcbf8a5

  • SSDEEP

    98304:qjq3foL7znvMlkLmLff2KFcAOfGDFGLDKewMUXOapNwIZE2WT:5fuvEl4mLXtFcAAKKDnwBuXvT

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 7 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf80f63c2622d84f1eb12031521e232193c38e0b9fb6d0ac0919b8de8f0241db.exe
    "C:\Users\Admin\AppData\Local\Temp\bf80f63c2622d84f1eb12031521e232193c38e0b9fb6d0ac0919b8de8f0241db.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\bf80f63c2622d84f1eb12031521e232193c38e0b9fb6d0ac0919b8de8f0241db.exe
      C:\Users\Admin\AppData\Local\Temp\bf80f63c2622d84f1eb12031521e232193c38e0b9fb6d0ac0919b8de8f0241db.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bf80f63c2622d84f1eb12031521e232193c38e0b9fb6d0ac0919b8de8f0241db.exe

    Filesize

    784KB

    MD5

    1b8bceeece90814eb7d23ed1b47bb310

    SHA1

    3dffac651aba5512ba12ab15475a0a5de3e43826

    SHA256

    6e55d72a8a1781c8ef52bc26b0aa4c3eebd86a843adfe03483c88f1e2b0edb3f

    SHA512

    1951a20d2b4b18ea9e0ec0e78b66a51246c37ff487479297a9182f587aecd2094b74a96c6fd994dba831e6d0a169ac64b0cc34732c25a0774f941636a93bb8d6

  • memory/2244-0-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/2244-14-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2244-1-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2244-9-0x00000000018B0000-0x0000000001974000-memory.dmp

    Filesize

    784KB

  • memory/2432-16-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/2432-17-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-23-0x0000000003250000-0x00000000033E3000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-22-0x0000000000120000-0x00000000001E4000-memory.dmp

    Filesize

    784KB

  • memory/2432-24-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/2432-33-0x00000000005A0000-0x000000000071F000-memory.dmp

    Filesize

    1.5MB

  • memory/2432-34-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB