Analysis
-
max time kernel
111s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 13:52
Behavioral task
behavioral1
Sample
c0c62879b42b8ab677ffe7d3724891a431f9677cd6b8d2002fdab8629cdbd507.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
c0c62879b42b8ab677ffe7d3724891a431f9677cd6b8d2002fdab8629cdbd507.exe
-
Size
1.5MB
-
MD5
6c4e53c828b72be3458f72586578e471
-
SHA1
919b93fed025946d44c1a8dc936b7b3662ae30bf
-
SHA256
c0c62879b42b8ab677ffe7d3724891a431f9677cd6b8d2002fdab8629cdbd507
-
SHA512
6fb07f960a6724e327953bdb04fa984aa3ebbc176d6c8ebb724ddab7781c3baddd2bae9bfbbed065ff1f167cb813e7d2f6cf4cdc167617955376c902976a8c16
-
SSDEEP
24576:RVIl/WDGCi7/qkat6zqxG2Z9mIhQvq8wd7NjVb65GsL9QsdkutxbVUDk+3HuP71H:ROdWCCi7/raWMmSdbbUGsVOutxLcM
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/4548-3-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig behavioral2/memory/4548-2-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig behavioral2/memory/4548-4-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig behavioral2/memory/4548-5-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig behavioral2/memory/4548-6-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig behavioral2/memory/4548-7-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig behavioral2/memory/4548-8-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig behavioral2/memory/4548-9-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig behavioral2/memory/4548-10-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig behavioral2/memory/4548-11-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig behavioral2/memory/4548-12-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig behavioral2/memory/4548-13-0x00007FF717910000-0x00007FF717C61000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/4548-0-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-3-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-2-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-4-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-5-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-6-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-7-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-8-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-9-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-10-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-11-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-12-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx behavioral2/memory/4548-13-0x00007FF717910000-0x00007FF717C61000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c0c62879b42b8ab677ffe7d3724891a431f9677cd6b8d2002fdab8629cdbd507.exedescription pid process Token: SeLockMemoryPrivilege 4548 c0c62879b42b8ab677ffe7d3724891a431f9677cd6b8d2002fdab8629cdbd507.exe Token: SeLockMemoryPrivilege 4548 c0c62879b42b8ab677ffe7d3724891a431f9677cd6b8d2002fdab8629cdbd507.exe