Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 00:06
Behavioral task
behavioral1
Sample
7a8c5d86a5d0cb2e90174d40f2ad21e066c6f7f47deb30136b0b58cde975511a.exe
Resource
win7-20241023-en
windows7-x64
5 signatures
120 seconds
General
-
Target
7a8c5d86a5d0cb2e90174d40f2ad21e066c6f7f47deb30136b0b58cde975511a.exe
-
Size
1.6MB
-
MD5
10f4a6c007e7ec7a45959fe8a15e5f66
-
SHA1
518b13f8d49cdcd16a58190de6480cec608a2558
-
SHA256
7a8c5d86a5d0cb2e90174d40f2ad21e066c6f7f47deb30136b0b58cde975511a
-
SHA512
1d013097890fb98fb4485ccaf9229e2e82f652cc753b236864acb7f6a9197ef27aea4f4f43b6d5380865171da62e7a5281d84212b9c1348db4777a5edb54265b
-
SSDEEP
24576:RVIl/WDGCi7/qkat62wT83PzKeLukbyUVWCPSuwNYWPxvyuEtrE60lmNgmlpF7cP:ROdWCCi7/ra+GJLuIaRNGQ3ak7
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/2140-2-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig behavioral1/memory/2140-3-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig behavioral1/memory/2140-4-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig behavioral1/memory/2140-5-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig behavioral1/memory/2140-6-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig behavioral1/memory/2140-7-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig behavioral1/memory/2140-8-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig behavioral1/memory/2140-9-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig behavioral1/memory/2140-10-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig behavioral1/memory/2140-11-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig behavioral1/memory/2140-12-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig behavioral1/memory/2140-13-0x000000013F380000-0x000000013F6D1000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral1/memory/2140-0-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-2-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-3-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-4-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-5-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-6-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-7-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-8-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-9-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-10-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-11-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-12-0x000000013F380000-0x000000013F6D1000-memory.dmp upx behavioral1/memory/2140-13-0x000000013F380000-0x000000013F6D1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7a8c5d86a5d0cb2e90174d40f2ad21e066c6f7f47deb30136b0b58cde975511a.exedescription pid process Token: SeLockMemoryPrivilege 2140 7a8c5d86a5d0cb2e90174d40f2ad21e066c6f7f47deb30136b0b58cde975511a.exe Token: SeLockMemoryPrivilege 2140 7a8c5d86a5d0cb2e90174d40f2ad21e066c6f7f47deb30136b0b58cde975511a.exe