Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 09:56
Behavioral task
behavioral1
Sample
07c20d6fdfc7a8f8ad4872fe94cfaf88437f27fb9e75a0558cae3f9d06f103e2N.exe
Resource
win7-20240903-en
4 signatures
120 seconds
General
-
Target
07c20d6fdfc7a8f8ad4872fe94cfaf88437f27fb9e75a0558cae3f9d06f103e2N.exe
-
Size
5.2MB
-
MD5
c4b3d122f22f5eba0543cf50ea5838b0
-
SHA1
2bef6f6efb93a2f861f33162e7d4220a9870522c
-
SHA256
07c20d6fdfc7a8f8ad4872fe94cfaf88437f27fb9e75a0558cae3f9d06f103e2
-
SHA512
b1ba0ef78105a3a1f5d06ca4e0749a0dd5b790a93864dd0699964800d325a83499b530d8328e32b1c1ab7fabb9e736e683fea574afe17c81bad34288fb1c4b5a
-
SSDEEP
49152:ROdWCCi7/raA56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lx:RWWBibj56utgpPFotBER/mQ32lUl
Malware Config
Signatures
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/1968-2-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/1968-3-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/1968-4-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/1968-5-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/1968-6-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/1968-7-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/1968-8-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/1968-9-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/1968-10-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/1968-11-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/1968-12-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/1968-13-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/1968-0-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-2-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-3-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-4-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-5-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-6-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-7-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-8-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-9-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-10-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-11-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-12-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1968-13-0x000000013F760000-0x000000013FAB1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1968 07c20d6fdfc7a8f8ad4872fe94cfaf88437f27fb9e75a0558cae3f9d06f103e2N.exe Token: SeLockMemoryPrivilege 1968 07c20d6fdfc7a8f8ad4872fe94cfaf88437f27fb9e75a0558cae3f9d06f103e2N.exe