Analysis
-
max time kernel
141s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/10/2024, 19:15
Behavioral task
behavioral1
Sample
2024-10-25_d27010a03d323baf2547873e4d2d33d4_polyvice_xmrig.exe
Resource
win7-20241010-en
6 signatures
150 seconds
General
-
Target
2024-10-25_d27010a03d323baf2547873e4d2d33d4_polyvice_xmrig.exe
-
Size
10.7MB
-
MD5
d27010a03d323baf2547873e4d2d33d4
-
SHA1
b84a4be6fc944f8dd032f633deb70cf067b197c8
-
SHA256
fa2928391d4d20f5fc2152cf8416b68abbcb3b6275fd991fad0c083355ebdbca
-
SHA512
0c71e5f8f26785f94bdfaa07f7a40a7f558feb32c9b5d10fb66b808fd280ed42cb2efbeec1610c418ace10410ebf161504658e56a9f8e21f94ef70b538988125
-
SSDEEP
196608:8PWHeFF+g3OLpTLXBljsge8TwI+Bc98+9ePTI:UFbAPPTN+C20e7I
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 14 IoCs
resource yara_rule behavioral1/memory/2236-2-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-4-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-5-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-6-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-7-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-8-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-9-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-11-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-12-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-13-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-14-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-15-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-16-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig behavioral1/memory/2236-17-0x000000013FE50000-0x0000000140992000-memory.dmp xmrig -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2236 2024-10-25_d27010a03d323baf2547873e4d2d33d4_polyvice_xmrig.exe Token: SeLockMemoryPrivilege 2236 2024-10-25_d27010a03d323baf2547873e4d2d33d4_polyvice_xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 2024-10-25_d27010a03d323baf2547873e4d2d33d4_polyvice_xmrig.exe