Analysis
-
max time kernel
141s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 12:32
Behavioral task
behavioral1
Sample
2024-11-19_9b899873766a77950b077ee62636f4c3_polyvice.exe
Resource
win7-20241010-en
windows7-x64
6 signatures
150 seconds
General
-
Target
2024-11-19_9b899873766a77950b077ee62636f4c3_polyvice.exe
-
Size
10.5MB
-
MD5
9b899873766a77950b077ee62636f4c3
-
SHA1
90c0fe129de2d3c5c86c8164fcd7a66d71a14bd9
-
SHA256
d52427c34275299e5ce264fdf5d3df2a812261cd12352276fcb0ccfd7f21265f
-
SHA512
d67a09edba4824c500dfc55c266946171ae495d263660e3e96e36c3f60ef60929b640ed4f7c608286d705b34134c427b70ddeae01e723a6c0c3643b69a65f0bf
-
SSDEEP
196608:7sgJIQolcPYjqkW56sjj29Q6Se8E5Ztsbzy:7ml8LC9DJjXsS
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 14 IoCs
Processes:
resource yara_rule behavioral1/memory/2248-3-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-4-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-5-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-6-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-7-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-8-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-9-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-11-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-12-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-13-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-14-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-15-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-16-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig behavioral1/memory/2248-17-0x000000013F390000-0x000000013FED8000-memory.dmp xmrig -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid Process 464 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-11-19_9b899873766a77950b077ee62636f4c3_polyvice.exedescription pid Process Token: SeLockMemoryPrivilege 2248 2024-11-19_9b899873766a77950b077ee62636f4c3_polyvice.exe Token: SeLockMemoryPrivilege 2248 2024-11-19_9b899873766a77950b077ee62636f4c3_polyvice.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
2024-11-19_9b899873766a77950b077ee62636f4c3_polyvice.exepid Process 2248 2024-11-19_9b899873766a77950b077ee62636f4c3_polyvice.exe