Analysis
-
max time kernel
110s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 18:01
Behavioral task
behavioral1
Sample
6c92ff260e07f361822f61ff59f232fb26d7bfdd25dcd3561b964043ed98c988.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
6c92ff260e07f361822f61ff59f232fb26d7bfdd25dcd3561b964043ed98c988.exe
-
Size
5.2MB
-
MD5
a867a4db683d0839f82da606b473d99b
-
SHA1
85583e3e37e396760098efe510f95f48d1e27e28
-
SHA256
6c92ff260e07f361822f61ff59f232fb26d7bfdd25dcd3561b964043ed98c988
-
SHA512
3977c8fd81022720d6192ce5ec0aedbbd7a68b4cce0e3aa4dbb11bd8dab906110ce6caab59cf68f727104da2c030400ac804c9012f27908926337109c961bc4c
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lU:RWWBibf56utgpPFotBER/mQ32lU4
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2616-2-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/2616-3-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/2616-4-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/2616-5-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/2616-6-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/2616-7-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/2616-8-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/2616-9-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/2616-10-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/2616-11-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/2616-12-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/2616-13-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2616-0-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-2-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-3-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-4-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-5-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-6-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-7-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-8-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-9-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-10-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-11-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-12-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/2616-13-0x000000013F820000-0x000000013FB71000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2616 6c92ff260e07f361822f61ff59f232fb26d7bfdd25dcd3561b964043ed98c988.exe Token: SeLockMemoryPrivilege 2616 6c92ff260e07f361822f61ff59f232fb26d7bfdd25dcd3561b964043ed98c988.exe