Analysis
-
max time kernel
105s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 00:47
Behavioral task
behavioral1
Sample
fab6786b37c1b17004bed3aee335e060N.exe
Resource
win7-20240903-en
4 signatures
120 seconds
General
-
Target
fab6786b37c1b17004bed3aee335e060N.exe
-
Size
5.9MB
-
MD5
fab6786b37c1b17004bed3aee335e060
-
SHA1
b90bffe63a7346b92d47f0b06de988e435c22ddf
-
SHA256
3b748c20fb945ecfed90895dc68ab91f0fd90f706d5df158f92d7f4c44d36f02
-
SHA512
f10b13006ad80c4297175c94a9bfd082b94216b7882e6b86eef891bb29dce2657f59296d995e71136e324972638abba488d08d8c2403f64496bf0661d9869ad0
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUG:Q+856utgpPF8u/7G
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/444-0-0x00007FF7EAF40000-0x00007FF7EB294000-memory.dmp xmrig behavioral2/memory/444-2-0x00007FF7EAF40000-0x00007FF7EB294000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/444-0-0x00007FF7EAF40000-0x00007FF7EB294000-memory.dmp upx behavioral2/memory/444-2-0x00007FF7EAF40000-0x00007FF7EB294000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 444 fab6786b37c1b17004bed3aee335e060N.exe Token: SeLockMemoryPrivilege 444 fab6786b37c1b17004bed3aee335e060N.exe