Analysis
-
max time kernel
120s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 19:59
Behavioral task
behavioral1
Sample
353320e763945d79bc9350cca4782c34caf94044a0562c9962b594de56939e85N.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
353320e763945d79bc9350cca4782c34caf94044a0562c9962b594de56939e85N.exe
-
Size
1.7MB
-
MD5
d9baf6b91f6e15e3c1c01714e6b7f31b
-
SHA1
ae78da85c8e4c73bd41eef123343c0491f32e6a5
-
SHA256
c9a5ea98d3c854d143abcef686b8787b7d299ccb65ee189d8fb4c36a0f052c4c
-
SHA512
80014b064048e5c29fa363f98664c19c3ea823b59e720b8f3f28637501f87988246178d0dbaaa5a9b90cf4b3dddfd3554b026b5abb333f288213cb97bb7fb824
-
SSDEEP
24576:RVIl/WDGCi7/qkat62wT83PzKeLukbyUVWCPSuwNYWPxvyuEtrE60lmNgmlpF7cN:ROdWCCi7/ra+GJLuIaRNGQ3a/6zz
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/3252-2-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig behavioral2/memory/3252-3-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig behavioral2/memory/3252-4-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig behavioral2/memory/3252-5-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig behavioral2/memory/3252-6-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig behavioral2/memory/3252-7-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig behavioral2/memory/3252-8-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig behavioral2/memory/3252-9-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig behavioral2/memory/3252-10-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig behavioral2/memory/3252-11-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig behavioral2/memory/3252-12-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig behavioral2/memory/3252-13-0x00007FF633810000-0x00007FF633B61000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/3252-0-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-2-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-3-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-4-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-5-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-6-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-7-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-8-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-9-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-10-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-11-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-12-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-13-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx behavioral2/memory/3252-14-0x00007FF633810000-0x00007FF633B61000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 3252 353320e763945d79bc9350cca4782c34caf94044a0562c9962b594de56939e85N.exe Token: SeLockMemoryPrivilege 3252 353320e763945d79bc9350cca4782c34caf94044a0562c9962b594de56939e85N.exe