Analysis
-
max time kernel
119s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 19:59
Behavioral task
behavioral1
Sample
353320e763945d79bc9350cca4782c34caf94044a0562c9962b594de56939e85N.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
353320e763945d79bc9350cca4782c34caf94044a0562c9962b594de56939e85N.exe
-
Size
1.7MB
-
MD5
d9baf6b91f6e15e3c1c01714e6b7f31b
-
SHA1
ae78da85c8e4c73bd41eef123343c0491f32e6a5
-
SHA256
c9a5ea98d3c854d143abcef686b8787b7d299ccb65ee189d8fb4c36a0f052c4c
-
SHA512
80014b064048e5c29fa363f98664c19c3ea823b59e720b8f3f28637501f87988246178d0dbaaa5a9b90cf4b3dddfd3554b026b5abb333f288213cb97bb7fb824
-
SSDEEP
24576:RVIl/WDGCi7/qkat62wT83PzKeLukbyUVWCPSuwNYWPxvyuEtrE60lmNgmlpF7cN:ROdWCCi7/ra+GJLuIaRNGQ3a/6zz
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/1120-2-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1120-3-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1120-4-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1120-5-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1120-6-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1120-7-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1120-8-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1120-9-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1120-10-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1120-11-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1120-12-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1120-13-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/1120-0-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-2-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-3-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-4-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-5-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-6-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-7-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-8-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-9-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-10-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-11-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-12-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1120-13-0x000000013FFD0000-0x0000000140321000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1120 353320e763945d79bc9350cca4782c34caf94044a0562c9962b594de56939e85N.exe Token: SeLockMemoryPrivilege 1120 353320e763945d79bc9350cca4782c34caf94044a0562c9962b594de56939e85N.exe