Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 01:29
Behavioral task
behavioral1
Sample
7462db469afd1d0c5b67203943dd34ccebd219de737a1f33f645166953513d9a.exe
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
7462db469afd1d0c5b67203943dd34ccebd219de737a1f33f645166953513d9a.exe
-
Size
5.2MB
-
MD5
8e02b87f59c6aecfc943f180ecd6c34c
-
SHA1
49fb62c38ccdb8a9533cf1646196bee221672668
-
SHA256
7462db469afd1d0c5b67203943dd34ccebd219de737a1f33f645166953513d9a
-
SHA512
aa9f5dc59f03fb247a87621cb39a078292eafd5766afad542605eae38682332f7e4ead7eaddb5938c4911474c1d9ac45ae3e6ecae357ac22330f067b16dbca63
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lq:RWWBibf56utgpPFotBER/mQ32lUW
Malware Config
Signatures
-
XMRig Miner payload 14 IoCs
resource yara_rule behavioral1/memory/1688-2-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-3-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-4-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-5-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-6-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-7-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-8-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-9-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-10-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-11-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-12-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-13-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-14-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1688-15-0x000000013F230000-0x000000013F581000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/1688-0-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-2-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-3-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-4-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-5-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-6-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-7-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-8-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-9-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-10-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-11-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-12-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-13-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-14-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/1688-15-0x000000013F230000-0x000000013F581000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1688 7462db469afd1d0c5b67203943dd34ccebd219de737a1f33f645166953513d9a.exe Token: SeLockMemoryPrivilege 1688 7462db469afd1d0c5b67203943dd34ccebd219de737a1f33f645166953513d9a.exe