Analysis
-
max time kernel
111s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 00:06
Behavioral task
behavioral1
Sample
7a8c5d86a5d0cb2e90174d40f2ad21e066c6f7f47deb30136b0b58cde975511a.exe
Resource
win7-20241023-en
5 signatures
120 seconds
General
-
Target
7a8c5d86a5d0cb2e90174d40f2ad21e066c6f7f47deb30136b0b58cde975511a.exe
-
Size
1.6MB
-
MD5
10f4a6c007e7ec7a45959fe8a15e5f66
-
SHA1
518b13f8d49cdcd16a58190de6480cec608a2558
-
SHA256
7a8c5d86a5d0cb2e90174d40f2ad21e066c6f7f47deb30136b0b58cde975511a
-
SHA512
1d013097890fb98fb4485ccaf9229e2e82f652cc753b236864acb7f6a9197ef27aea4f4f43b6d5380865171da62e7a5281d84212b9c1348db4777a5edb54265b
-
SSDEEP
24576:RVIl/WDGCi7/qkat62wT83PzKeLukbyUVWCPSuwNYWPxvyuEtrE60lmNgmlpF7cP:ROdWCCi7/ra+GJLuIaRNGQ3ak7
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/4868-3-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig behavioral2/memory/4868-2-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig behavioral2/memory/4868-4-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig behavioral2/memory/4868-5-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig behavioral2/memory/4868-6-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig behavioral2/memory/4868-7-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig behavioral2/memory/4868-8-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig behavioral2/memory/4868-9-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig behavioral2/memory/4868-10-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig behavioral2/memory/4868-11-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig behavioral2/memory/4868-12-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig behavioral2/memory/4868-13-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/4868-0-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-3-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-2-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-4-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-5-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-6-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-7-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-8-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-9-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-10-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-11-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-12-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx behavioral2/memory/4868-13-0x00007FF78A940000-0x00007FF78AC91000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4868 7a8c5d86a5d0cb2e90174d40f2ad21e066c6f7f47deb30136b0b58cde975511a.exe Token: SeLockMemoryPrivilege 4868 7a8c5d86a5d0cb2e90174d40f2ad21e066c6f7f47deb30136b0b58cde975511a.exe