Analysis
-
max time kernel
110s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 00:28
Behavioral task
behavioral1
Sample
364171ec487d458477588299137b7669279b53078f813bf3cc80b8bbcbe66ffc.exe
Resource
win7-20241023-en
5 signatures
120 seconds
General
-
Target
364171ec487d458477588299137b7669279b53078f813bf3cc80b8bbcbe66ffc.exe
-
Size
5.2MB
-
MD5
b33b7ef520c0fa2ae83e8be0f4bdd4ae
-
SHA1
16b435903f717ea31b3ac21af6fea5edcdab8173
-
SHA256
364171ec487d458477588299137b7669279b53078f813bf3cc80b8bbcbe66ffc
-
SHA512
e3076723e43e257eb53800c519b065516c4e4e8965cf65d7f5f22ce8e7f24649c1deb395ebd8d4594bcdd2521464a7d9f2049184e30d36857a33d58b6fb9cede
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l7:RWWBibf56utgpPFotBER/mQ32lU/
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2912-2-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2912-3-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2912-4-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2912-5-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2912-6-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2912-7-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2912-8-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2912-9-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2912-10-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2912-11-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2912-12-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2912-13-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2912-0-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-2-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-3-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-4-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-5-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-6-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-7-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-8-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-9-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-10-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-11-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-12-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/2912-13-0x000000013FE70000-0x00000001401C1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2912 364171ec487d458477588299137b7669279b53078f813bf3cc80b8bbcbe66ffc.exe Token: SeLockMemoryPrivilege 2912 364171ec487d458477588299137b7669279b53078f813bf3cc80b8bbcbe66ffc.exe