Analysis
-
max time kernel
110s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2024, 18:01
Behavioral task
behavioral1
Sample
6c92ff260e07f361822f61ff59f232fb26d7bfdd25dcd3561b964043ed98c988.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
6c92ff260e07f361822f61ff59f232fb26d7bfdd25dcd3561b964043ed98c988.exe
-
Size
5.2MB
-
MD5
a867a4db683d0839f82da606b473d99b
-
SHA1
85583e3e37e396760098efe510f95f48d1e27e28
-
SHA256
6c92ff260e07f361822f61ff59f232fb26d7bfdd25dcd3561b964043ed98c988
-
SHA512
3977c8fd81022720d6192ce5ec0aedbbd7a68b4cce0e3aa4dbb11bd8dab906110ce6caab59cf68f727104da2c030400ac804c9012f27908926337109c961bc4c
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lU:RWWBibf56utgpPFotBER/mQ32lU4
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/1120-2-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig behavioral2/memory/1120-3-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig behavioral2/memory/1120-4-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig behavioral2/memory/1120-5-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig behavioral2/memory/1120-6-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig behavioral2/memory/1120-7-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig behavioral2/memory/1120-8-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig behavioral2/memory/1120-9-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig behavioral2/memory/1120-10-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig behavioral2/memory/1120-11-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig behavioral2/memory/1120-12-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig behavioral2/memory/1120-13-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/1120-0-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-2-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-3-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-4-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-5-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-6-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-7-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-8-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-9-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-10-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-11-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-12-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx behavioral2/memory/1120-13-0x00007FF68CF00000-0x00007FF68D251000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1120 6c92ff260e07f361822f61ff59f232fb26d7bfdd25dcd3561b964043ed98c988.exe Token: SeLockMemoryPrivilege 1120 6c92ff260e07f361822f61ff59f232fb26d7bfdd25dcd3561b964043ed98c988.exe