Analysis
-
max time kernel
110s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 13:52
Behavioral task
behavioral1
Sample
c0c62879b42b8ab677ffe7d3724891a431f9677cd6b8d2002fdab8629cdbd507.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
c0c62879b42b8ab677ffe7d3724891a431f9677cd6b8d2002fdab8629cdbd507.exe
-
Size
1.5MB
-
MD5
6c4e53c828b72be3458f72586578e471
-
SHA1
919b93fed025946d44c1a8dc936b7b3662ae30bf
-
SHA256
c0c62879b42b8ab677ffe7d3724891a431f9677cd6b8d2002fdab8629cdbd507
-
SHA512
6fb07f960a6724e327953bdb04fa984aa3ebbc176d6c8ebb724ddab7781c3baddd2bae9bfbbed065ff1f167cb813e7d2f6cf4cdc167617955376c902976a8c16
-
SSDEEP
24576:RVIl/WDGCi7/qkat6zqxG2Z9mIhQvq8wd7NjVb65GsL9QsdkutxbVUDk+3HuP71H:ROdWCCi7/raWMmSdbbUGsVOutxLcM
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/1508-2-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/1508-3-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/1508-4-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/1508-5-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/1508-6-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/1508-7-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/1508-8-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/1508-9-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/1508-10-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/1508-11-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/1508-12-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/1508-13-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/1508-0-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-2-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-3-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-4-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-5-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-6-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-7-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-8-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-9-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-10-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-11-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-12-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/1508-13-0x000000013FD80000-0x00000001400D1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1508 c0c62879b42b8ab677ffe7d3724891a431f9677cd6b8d2002fdab8629cdbd507.exe Token: SeLockMemoryPrivilege 1508 c0c62879b42b8ab677ffe7d3724891a431f9677cd6b8d2002fdab8629cdbd507.exe