Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 01:06
Behavioral task
behavioral1
Sample
c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe
Resource
win7-20240903-en
General
-
Target
c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe
-
Size
2.0MB
-
MD5
932daa7da28f9391121b242f19872a3c
-
SHA1
b3aa895a279ecfa818ddcadbafa7ca06b38310fe
-
SHA256
c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278
-
SHA512
3f7a11d75c9bc89ad6c271566e10d574059f5a3ee7f2665d8e89e733c05ba45f3fab27e2ca8e3a20a02cd45cc76a7c2302d8a44b242b070779ccf3a575dcc57a
-
SSDEEP
49152:unER8XfHaTheribOUfUhWhKtdOppFjwWZwqPh/KKlUm3eeq:UbMe2bbfUhWh+dOppFgqPhC0q
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/1972-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1972-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2552-41-0x0000000023910000-0x0000000023A92000-memory.dmp xmrig behavioral1/memory/2552-40-0x0000000000400000-0x000000000057C000-memory.dmp xmrig behavioral1/memory/2552-38-0x00000000235F0000-0x0000000023783000-memory.dmp xmrig behavioral1/memory/2552-29-0x0000000000400000-0x000000000057C000-memory.dmp xmrig behavioral1/memory/2552-23-0x0000000000400000-0x0000000000582000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2552 c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe -
Executes dropped EXE 1 IoCs
pid Process 2552 c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe -
Loads dropped DLL 1 IoCs
pid Process 1972 c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe -
resource yara_rule behavioral1/memory/1972-0-0x0000000000400000-0x0000000000A7A000-memory.dmp upx behavioral1/files/0x00090000000120ce-13.dat upx behavioral1/memory/2552-28-0x0000000000400000-0x0000000000A7A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1972 c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1972 c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe 2552 c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2552 1972 c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe 31 PID 1972 wrote to memory of 2552 1972 c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe 31 PID 1972 wrote to memory of 2552 1972 c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe 31 PID 1972 wrote to memory of 2552 1972 c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe"C:\Users\Admin\AppData\Local\Temp\c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exeC:\Users\Admin\AppData\Local\Temp\c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\c18ea8bd83209dfae2c7ec945031e6a001f4eeb5387d039bed18e7df8eb06278.exe
Filesize2.0MB
MD5e624541e82865f653e36bc322892d9cc
SHA1d79e678a27b790f0fa6af41956c6e298e0889aae
SHA256a54993c16783f6732bab47d62bea956bc7655bf92773489618a2653e4c6f46bf
SHA512a3f72453719a188553dde5ef906ca6ae0a6bd2bf576c176f2d3419f3f7c3bb9ba069d7fd5093d1a3e3971fb629e3c8cb28cb4e72b3bc1a863a8368ae02106edc