Analysis
-
max time kernel
131s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 19:53
Behavioral task
behavioral1
Sample
3b013af6817cc662c454de0b66e412d598faca8b14f26784800ee35b95f1d63c.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
3b013af6817cc662c454de0b66e412d598faca8b14f26784800ee35b95f1d63c.exe
-
Size
5.9MB
-
MD5
147490bdfb60b8e61529fdc47bda543b
-
SHA1
56c123ebd361ada16790b941e99c4c037025c6b8
-
SHA256
3b013af6817cc662c454de0b66e412d598faca8b14f26784800ee35b95f1d63c
-
SHA512
cb6c307b37d89e8c3a7f7e677a062486ba138885946dfa2bee9b974a7099851ca2eb4d020b74f9ef758e7ea72f4f44f820c25c7b199b48fc0d1460e03138a1ef
-
SSDEEP
98304:oemTLkNdfE0pZrt56utgpPFotBER/mQ32lUr:T+856utgpPF8u/7r
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/1124-0-0x00007FF7BB370000-0x00007FF7BB6C4000-memory.dmp xmrig behavioral2/memory/1124-2-0x00007FF7BB370000-0x00007FF7BB6C4000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/1124-0-0x00007FF7BB370000-0x00007FF7BB6C4000-memory.dmp upx behavioral2/memory/1124-2-0x00007FF7BB370000-0x00007FF7BB6C4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1124 3b013af6817cc662c454de0b66e412d598faca8b14f26784800ee35b95f1d63c.exe Token: SeLockMemoryPrivilege 1124 3b013af6817cc662c454de0b66e412d598faca8b14f26784800ee35b95f1d63c.exe