Analysis
-
max time kernel
41s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 01:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7568a61affbe8f38cb951a8f4c4191809470b24d046a043602db5f4717f721f4.exe
Resource
win7-20240508-en
4 signatures
150 seconds
General
-
Target
7568a61affbe8f38cb951a8f4c4191809470b24d046a043602db5f4717f721f4.exe
-
Size
8.8MB
-
MD5
97649c9e1e76f3e4bd85b26caa806cf1
-
SHA1
83d8ccc5a595030fa2fcaedb92e4402237f1a33c
-
SHA256
7568a61affbe8f38cb951a8f4c4191809470b24d046a043602db5f4717f721f4
-
SHA512
c7ca4a5c6193be6a5533e49cd1744d8809291a9f08c63bf6f080e97bc85f9d6b41dfe15c337ea802f2d0bcba4bd589941671c1f17e61d186851154e0ad97b829
-
SSDEEP
196608:G75HPwsO2FGMeBJwkQse3gS8xovaCoNTyxH3DKGj:e5HPzO2FCBJwkQsSgNyaHPGj
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/432-8-0x00007FF65C540000-0x00007FF65DAC5000-memory.dmp xmrig behavioral2/memory/432-10-0x00007FF65C540000-0x00007FF65DAC5000-memory.dmp xmrig -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 432 7568a61affbe8f38cb951a8f4c4191809470b24d046a043602db5f4717f721f4.exe 432 7568a61affbe8f38cb951a8f4c4191809470b24d046a043602db5f4717f721f4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 432 7568a61affbe8f38cb951a8f4c4191809470b24d046a043602db5f4717f721f4.exe 432 7568a61affbe8f38cb951a8f4c4191809470b24d046a043602db5f4717f721f4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7568a61affbe8f38cb951a8f4c4191809470b24d046a043602db5f4717f721f4.exe"C:\Users\Admin\AppData\Local\Temp\7568a61affbe8f38cb951a8f4c4191809470b24d046a043602db5f4717f721f4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:432