Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 07:36
Behavioral task
behavioral1
Sample
f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe
Resource
win7-20240903-en
General
-
Target
f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe
-
Size
2.0MB
-
MD5
62bd03fe48a94ced8063338d607b6163
-
SHA1
32af5c8a4c7e9b98dda58655afc1134c7f3285ff
-
SHA256
f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016
-
SHA512
dd739dd0d14c745195d4740f27b928c92d20b0c5f675a473b8dc71ee74e8bad67d9a45c4014ea00c7c087169cc34093ce7c9672a1180c4d5272b494a9b569689
-
SSDEEP
49152:cXtWiLBpIzYtBSOhxNn4JwWays9+xot/HKCXDkHEJMBb2AXYch/KKlUm3eeq:cXUiLBsCBSOhxN4y3IxotvKsQEJMByAU
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2400-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2400-17-0x0000000023600000-0x0000000023C7A000-memory.dmp xmrig behavioral1/memory/2400-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2112-42-0x0000000000400000-0x000000000057C000-memory.dmp xmrig behavioral1/memory/2112-32-0x0000000000400000-0x000000000057C000-memory.dmp xmrig behavioral1/memory/2112-31-0x00000000238D0000-0x0000000023A52000-memory.dmp xmrig behavioral1/memory/2112-25-0x0000000000400000-0x0000000000582000-memory.dmp xmrig behavioral1/memory/2112-41-0x0000000023730000-0x00000000238C3000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2112 f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe -
Executes dropped EXE 1 IoCs
pid Process 2112 f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe -
Loads dropped DLL 1 IoCs
pid Process 2400 f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe -
resource yara_rule behavioral1/memory/2400-0-0x0000000000400000-0x0000000000A7A000-memory.dmp upx behavioral1/files/0x000b000000012253-13.dat upx behavioral1/memory/2400-17-0x0000000023600000-0x0000000023C7A000-memory.dmp upx behavioral1/memory/2112-18-0x0000000000400000-0x0000000000A7A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2400 f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2400 f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe 2112 f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2112 2400 f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe 31 PID 2400 wrote to memory of 2112 2400 f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe 31 PID 2400 wrote to memory of 2112 2400 f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe 31 PID 2400 wrote to memory of 2112 2400 f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe"C:\Users\Admin\AppData\Local\Temp\f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exeC:\Users\Admin\AppData\Local\Temp\f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f9a6fe00a53aa6c8fb561202ddf81c8247d0f0a91fc5f980d20776d5a69ae016.exe
Filesize2.0MB
MD51860aad5e2edb78f6337da0f7be3b7aa
SHA166ab729e3825c0bab0dbcf2a504e5aedc54c4ec2
SHA2565aea8b1e9d82104930f9bb0c7ad3a382c29cbd9935bd79e86fb9b144fd77fcf2
SHA5124defa485020e1eb9dca886cfc695b852232e553e5b81c6a17e778c04d1063ed800bacb720ff50f58275f890ec205e04b8f568e10ee131391ba604b98bf9243b2