Analysis
-
max time kernel
110s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 23:05
Behavioral task
behavioral1
Sample
575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25.exe
-
Size
5.2MB
-
MD5
8817471c75f477df0aabd4d1406b7164
-
SHA1
02cab56a572c83de934fbc7ec5821fe1d514ede0
-
SHA256
575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25
-
SHA512
dacc710cd3bc100b59416b0d0bb0bc3f57188eb62c40df7fd6562e090ce87c94c1545552d74e00b378d9b245e8edaa2e5add5db5bea22bb1a6863dcfe0cfac37
-
SSDEEP
49152:ROdWCCi7/rai56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lt:RWWBibd56utgpPFotBER/mQ32lUx
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/1088-2-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig behavioral2/memory/1088-3-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig behavioral2/memory/1088-4-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig behavioral2/memory/1088-5-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig behavioral2/memory/1088-6-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig behavioral2/memory/1088-7-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig behavioral2/memory/1088-8-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig behavioral2/memory/1088-9-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig behavioral2/memory/1088-10-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig behavioral2/memory/1088-11-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig behavioral2/memory/1088-12-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig behavioral2/memory/1088-13-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/1088-0-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-2-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-3-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-4-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-5-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-6-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-7-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-8-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-9-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-10-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-11-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-12-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx behavioral2/memory/1088-13-0x00007FF6769F0000-0x00007FF676D41000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25.exedescription pid process Token: SeLockMemoryPrivilege 1088 575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25.exe Token: SeLockMemoryPrivilege 1088 575958f9e2a005193976657a9292b15b0892325b0040532ef1f1f08b2f556b25.exe