Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 11:53
Behavioral task
behavioral1
Sample
957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe
Resource
win7-20240729-en
General
-
Target
957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe
-
Size
784KB
-
MD5
580f430b7ad43bda7fdc08f2a25b75d0
-
SHA1
26211f1c265345d5f82920937d8d83c324757ca3
-
SHA256
957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202b
-
SHA512
90269a672fb924300d2f0aac7692bf38e2e67dc1e1bdd14ae706ca5a7d6a6564b391f4abbef1fc22118f1f5393cc550493f62935dc8e70a9553b79f55a2b9406
-
SSDEEP
12288:4uZsotUI4epEmji8xK2VhTx+u6+o+d8VeBZfUtSzPqMacK5naAxTZ8+reNNPqpCl:vSmK8Emm72nA1eBqsPXavDxReNNAXbO
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/2984-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2984-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3584-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3584-20-0x00000000053D0000-0x0000000005563000-memory.dmp xmrig behavioral2/memory/3584-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3584-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3584 957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe -
Executes dropped EXE 1 IoCs
pid Process 3584 957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe -
resource yara_rule behavioral2/memory/2984-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000c000000023b0c-11.dat upx behavioral2/memory/3584-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2984 957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2984 957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe 3584 957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3584 2984 957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe 83 PID 2984 wrote to memory of 3584 2984 957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe 83 PID 2984 wrote to memory of 3584 2984 957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe"C:\Users\Admin\AppData\Local\Temp\957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exeC:\Users\Admin\AppData\Local\Temp\957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\957099db7402901e42a1829c9524b2a2f17670f25712e905af788c0c0734202bN.exe
Filesize784KB
MD52331d74ddc967f22652e9a849f1f4312
SHA1fa582c2517f99f0376f93f598bca5e7126ea912e
SHA256f7468f0496eb2107b8bafa8cbc6d43529ccb8780de6814f8d758c95a369fca84
SHA512b63f36c59fb8aae5df86fb3896f37cbda930bfe7a95ef9f09eedcbb8c65119346a89414e14e4816e95524c690bfb1112bb628457753a1de0672b7a5af8d38c3d