Analysis
-
max time kernel
52s -
max time network
62s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 19:05
Behavioral task
behavioral1
Sample
3a9c79efc3d9ce0b93fda269fe1dfb5811ac557c38cc545e04e1a41ec4fab682.exe
Resource
win7-20240903-en
4 signatures
60 seconds
General
-
Target
3a9c79efc3d9ce0b93fda269fe1dfb5811ac557c38cc545e04e1a41ec4fab682.exe
-
Size
6.0MB
-
MD5
399e8d7c4a94ac1cb1621e6be8f334a6
-
SHA1
0be1a464a08b5a31650d058a19828030a975d3d2
-
SHA256
3a9c79efc3d9ce0b93fda269fe1dfb5811ac557c38cc545e04e1a41ec4fab682
-
SHA512
9563f7cf4bfbd1566f1cfd20d6cba4914d70b85ebb9f1471001c59e27c346a66a665ad300fa3d9fe12f11992e1309be2a07f33ef61d93851a5a5e7b2576a35c3
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUg:Q+856utgpPF8u/7g
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/1772-0-0x00007FF742CD0000-0x00007FF743024000-memory.dmp xmrig behavioral2/memory/1772-2-0x00007FF742CD0000-0x00007FF743024000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/1772-0-0x00007FF742CD0000-0x00007FF743024000-memory.dmp upx behavioral2/memory/1772-2-0x00007FF742CD0000-0x00007FF743024000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1772 3a9c79efc3d9ce0b93fda269fe1dfb5811ac557c38cc545e04e1a41ec4fab682.exe Token: SeLockMemoryPrivilege 1772 3a9c79efc3d9ce0b93fda269fe1dfb5811ac557c38cc545e04e1a41ec4fab682.exe