Analysis
-
max time kernel
111s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 20:52
Behavioral task
behavioral1
Sample
43649881c860c5b01c2d85ebf83fe1bf28e03945d8e533b35f41b414fa2247a0N.exe
Resource
win7-20241010-en
windows7-x64
5 signatures
120 seconds
General
-
Target
43649881c860c5b01c2d85ebf83fe1bf28e03945d8e533b35f41b414fa2247a0N.exe
-
Size
1.0MB
-
MD5
fa1ae1f595aa7ddd8a9c6208f423fea5
-
SHA1
c840e84411aa5ccd02575991928d2685fc5ace1c
-
SHA256
1c33924f9c1c36e58c07507ffeaacc9b58ed1aa32d6660b48effc2568690fd75
-
SHA512
31cadeecdb22b486d703fe9db7063d6a5cf63c94e3b07616fb05dbc00cc2592ff560dca246c8027cbc51e9b8ae609b06bf67b874e8c1f0bc5c5ccbfdfc9da3b5
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlWXWZ5Pbcq92zdxo06KJ:knw9oUUEEDl37jcq4PDr
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2484-3-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2484-2-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2484-4-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2484-5-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2484-6-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2484-7-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2484-8-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2484-9-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2484-10-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2484-11-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2484-12-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2484-13-0x000000013F250000-0x000000013F641000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2484-1-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-3-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-2-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-4-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-5-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-6-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-7-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-8-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-9-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-10-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-11-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-12-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2484-13-0x000000013F250000-0x000000013F641000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2484 43649881c860c5b01c2d85ebf83fe1bf28e03945d8e533b35f41b414fa2247a0N.exe Token: SeLockMemoryPrivilege 2484 43649881c860c5b01c2d85ebf83fe1bf28e03945d8e533b35f41b414fa2247a0N.exe