Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 04:33
Behavioral task
behavioral1
Sample
62d04043314444de12f5098570162ed15720b424af41ffcfb02bd0bb44cefa69.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
62d04043314444de12f5098570162ed15720b424af41ffcfb02bd0bb44cefa69.exe
-
Size
1.5MB
-
MD5
1859bb4d87dcfb644c62bb63a4c61f81
-
SHA1
9937e90107034fc6e78e6627fa9824e8828c8e65
-
SHA256
62d04043314444de12f5098570162ed15720b424af41ffcfb02bd0bb44cefa69
-
SHA512
e8d8acee6e062a06d3bb174fb5ecb7871b69c8078f177194008a7914cf73e6e8d9ca50c63d607cc30a6e105ffe09cde0bcadf9564f964233f81411131e4ff163
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlGC78XIHbAYhbc8lFad+tsytA7WEXLsh:knw9oUUEEDlGUJ8Y9c87MQosh
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2412-2-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2412-3-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2412-4-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2412-5-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2412-6-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2412-7-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2412-8-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2412-9-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2412-10-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2412-11-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2412-12-0x000000013F250000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2412-13-0x000000013F250000-0x000000013F641000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2412-0-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-2-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-3-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-4-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-5-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-6-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-7-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-8-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-9-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-10-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-11-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-12-0x000000013F250000-0x000000013F641000-memory.dmp upx behavioral1/memory/2412-13-0x000000013F250000-0x000000013F641000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2412 62d04043314444de12f5098570162ed15720b424af41ffcfb02bd0bb44cefa69.exe Token: SeLockMemoryPrivilege 2412 62d04043314444de12f5098570162ed15720b424af41ffcfb02bd0bb44cefa69.exe