Analysis
-
max time kernel
110s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 09:56
Behavioral task
behavioral1
Sample
07c20d6fdfc7a8f8ad4872fe94cfaf88437f27fb9e75a0558cae3f9d06f103e2N.exe
Resource
win7-20240903-en
4 signatures
120 seconds
General
-
Target
07c20d6fdfc7a8f8ad4872fe94cfaf88437f27fb9e75a0558cae3f9d06f103e2N.exe
-
Size
5.2MB
-
MD5
c4b3d122f22f5eba0543cf50ea5838b0
-
SHA1
2bef6f6efb93a2f861f33162e7d4220a9870522c
-
SHA256
07c20d6fdfc7a8f8ad4872fe94cfaf88437f27fb9e75a0558cae3f9d06f103e2
-
SHA512
b1ba0ef78105a3a1f5d06ca4e0749a0dd5b790a93864dd0699964800d325a83499b530d8328e32b1c1ab7fabb9e736e683fea574afe17c81bad34288fb1c4b5a
-
SSDEEP
49152:ROdWCCi7/raA56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lx:RWWBibj56utgpPFotBER/mQ32lUl
Malware Config
Signatures
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/3360-2-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig behavioral2/memory/3360-3-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig behavioral2/memory/3360-4-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig behavioral2/memory/3360-5-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig behavioral2/memory/3360-6-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig behavioral2/memory/3360-7-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig behavioral2/memory/3360-8-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig behavioral2/memory/3360-9-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig behavioral2/memory/3360-10-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig behavioral2/memory/3360-11-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig behavioral2/memory/3360-12-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig behavioral2/memory/3360-13-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/3360-0-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-2-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-3-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-4-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-5-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-6-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-7-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-8-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-9-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-10-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-11-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-12-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx behavioral2/memory/3360-13-0x00007FF715D70000-0x00007FF7160C1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 3360 07c20d6fdfc7a8f8ad4872fe94cfaf88437f27fb9e75a0558cae3f9d06f103e2N.exe Token: SeLockMemoryPrivilege 3360 07c20d6fdfc7a8f8ad4872fe94cfaf88437f27fb9e75a0558cae3f9d06f103e2N.exe