Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 08:51
Behavioral task
behavioral1
Sample
9edb39cb1929b92f226c6f7c9c80fb502650037244bca19ef6add5a1389bd756.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
9edb39cb1929b92f226c6f7c9c80fb502650037244bca19ef6add5a1389bd756.exe
-
Size
5.2MB
-
MD5
8c9aef988ce6ccd1a67fbcba8f254e7e
-
SHA1
aaf6badf1878fd684c66aeb765c839306c30d883
-
SHA256
9edb39cb1929b92f226c6f7c9c80fb502650037244bca19ef6add5a1389bd756
-
SHA512
d0ce815a0b05fff24a51bdf05369f233c90cc796b6d9326a0ae802fcf075d9b07debe4e25c24c27163ad65c0d85d050436695ed2eecdabb87667adaea92d5eda
-
SSDEEP
49152:ROdWCCi7/rai56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lB:RWWBibd56utgpPFotBER/mQ32lUd
Malware Config
Signatures
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral1/memory/2096-2-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-3-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-4-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-5-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-6-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-7-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-8-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-9-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-10-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-11-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-12-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-13-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-14-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-15-0x000000013F420000-0x000000013F771000-memory.dmp xmrig behavioral1/memory/2096-16-0x000000013F420000-0x000000013F771000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2096-0-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-2-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-3-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-4-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-5-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-6-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-7-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-8-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-9-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-10-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-11-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-12-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-13-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-14-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-15-0x000000013F420000-0x000000013F771000-memory.dmp upx behavioral1/memory/2096-16-0x000000013F420000-0x000000013F771000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2096 9edb39cb1929b92f226c6f7c9c80fb502650037244bca19ef6add5a1389bd756.exe Token: SeLockMemoryPrivilege 2096 9edb39cb1929b92f226c6f7c9c80fb502650037244bca19ef6add5a1389bd756.exe