Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 12:00
Behavioral task
behavioral1
Sample
e3f256eb618407a8a502815582624743d44107fb9bc7978adafec1769f239e7b.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
e3f256eb618407a8a502815582624743d44107fb9bc7978adafec1769f239e7b.exe
-
Size
1.5MB
-
MD5
5206d4e17dd63d8a15bbf1b6801e79b5
-
SHA1
1b3a212f238fb262378bed2b72e4d7fb6853a3e8
-
SHA256
e3f256eb618407a8a502815582624743d44107fb9bc7978adafec1769f239e7b
-
SHA512
8797fab8f133debd4ec1813445dca44b75431e1df1c47e19c6137195e66af80f4c3e49116e7e2b9d6a2d6ac192b923ee55abe4b01fb35eab492d408e5b6eaf9f
-
SSDEEP
24576:RVIl/WDGCi7/qkat6zqxG2Z9mIhQvq8wd7NjVb65GsL9QsdkutxbVUDk+3HuP7jp:ROdWCCi7/raWMmSdbbUGsVOutxLGdI
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/2252-2-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2252-3-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2252-4-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2252-5-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2252-6-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2252-7-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2252-8-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2252-9-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2252-10-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2252-11-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2252-12-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2252-13-0x000000013F1E0000-0x000000013F531000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral1/memory/2252-0-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-2-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-3-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-4-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-5-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-6-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-7-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-8-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-9-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-10-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-11-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-12-0x000000013F1E0000-0x000000013F531000-memory.dmp upx behavioral1/memory/2252-13-0x000000013F1E0000-0x000000013F531000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e3f256eb618407a8a502815582624743d44107fb9bc7978adafec1769f239e7b.exedescription pid process Token: SeLockMemoryPrivilege 2252 e3f256eb618407a8a502815582624743d44107fb9bc7978adafec1769f239e7b.exe Token: SeLockMemoryPrivilege 2252 e3f256eb618407a8a502815582624743d44107fb9bc7978adafec1769f239e7b.exe