Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 23:05
Behavioral task
behavioral1
Sample
575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25.exe
-
Size
5.2MB
-
MD5
8817471c75f477df0aabd4d1406b7164
-
SHA1
02cab56a572c83de934fbc7ec5821fe1d514ede0
-
SHA256
575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25
-
SHA512
dacc710cd3bc100b59416b0d0bb0bc3f57188eb62c40df7fd6562e090ce87c94c1545552d74e00b378d9b245e8edaa2e5add5db5bea22bb1a6863dcfe0cfac37
-
SSDEEP
49152:ROdWCCi7/rai56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lt:RWWBibd56utgpPFotBER/mQ32lUx
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/2520-2-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/2520-3-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/2520-4-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/2520-5-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/2520-6-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/2520-7-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/2520-8-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/2520-9-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/2520-10-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/2520-11-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/2520-12-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/2520-13-0x000000013F510000-0x000000013F861000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral1/memory/2520-0-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-2-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-3-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-4-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-5-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-6-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-7-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-8-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-9-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-10-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-11-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-12-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/2520-13-0x000000013F510000-0x000000013F861000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25.exedescription pid process Token: SeLockMemoryPrivilege 2520 575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25.exe Token: SeLockMemoryPrivilege 2520 575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25.exe