Analysis
-
max time kernel
110s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 23:17
Behavioral task
behavioral1
Sample
635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
120 seconds
General
-
Target
635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e.exe
-
Size
1.9MB
-
MD5
b491f21e9d8964b3118b6100676cf0cc
-
SHA1
9a074f01f0775dfb4e66cc6752614903b2637481
-
SHA256
635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e
-
SHA512
80bd1e09a03af97b35da108e7011d75f931f19f14d465ff77229725ef9ff0771e5b7fc2fa075d767ed85bc232ac84a6f7b57b07769c0d921e071905dbeecf49c
-
SSDEEP
49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pCB2lU2:NABp
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/2104-15-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig behavioral1/memory/2104-16-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig behavioral1/memory/2104-17-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig behavioral1/memory/2104-18-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig behavioral1/memory/2104-19-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig behavioral1/memory/2104-20-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig behavioral1/memory/2104-21-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig behavioral1/memory/2104-22-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig behavioral1/memory/2104-23-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig behavioral1/memory/2104-24-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig behavioral1/memory/2104-25-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig behavioral1/memory/2104-26-0x000000013F7E0000-0x000000013FBD2000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral1/memory/2104-1-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-15-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-16-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-17-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-18-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-19-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-20-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-21-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-22-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-23-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-24-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-25-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx behavioral1/memory/2104-26-0x000000013F7E0000-0x000000013FBD2000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2504 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e.exepowershell.exedescription pid process Token: SeLockMemoryPrivilege 2104 635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e.exe Token: SeLockMemoryPrivilege 2104 635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e.exe Token: SeDebugPrivilege 2504 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e.exedescription pid process target process PID 2104 wrote to memory of 2504 2104 635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e.exe powershell.exe PID 2104 wrote to memory of 2504 2104 635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e.exe powershell.exe PID 2104 wrote to memory of 2504 2104 635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e.exe"C:\Users\Admin\AppData\Local\Temp\635a1fa6be24e24ae11cd67152f224b97d05fe6afa39ab4dc14442b74666a42e.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Invoke-WebRequest "https://raw.githubusercontent.com/" "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-