Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 04:44
Behavioral task
behavioral1
Sample
0cf3a25d268ff5ff8073bc2f4bc0227328c3e160bbd3f93c99ca64d102003f76.exe
Resource
win7-20241010-en
windows7-x64
8 signatures
120 seconds
General
-
Target
0cf3a25d268ff5ff8073bc2f4bc0227328c3e160bbd3f93c99ca64d102003f76.exe
-
Size
1.8MB
-
MD5
e860d8b9ac92d73396e751573e99e393
-
SHA1
2aebab66676d179f325812d7bf794ddf28e355c3
-
SHA256
0cf3a25d268ff5ff8073bc2f4bc0227328c3e160bbd3f93c99ca64d102003f76
-
SHA512
f16467cf155d75dac42e99884b294081e3db5589466ab862f1f4107ad69e968a589e0683b2d70f03a461fefc473b0a9e8102d26c2aef6af9775fae80f0df110a
-
SSDEEP
24576:zv3/fTLF671TilQFG4P5PMkibTJH+2Q/ynKeWY1s38kQu12bPxvyuzaBgJ9pcFty:Lz071uv4BPMkibTIA5I4TNrpDGd9WE+
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2528-14-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig behavioral1/memory/2528-15-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig behavioral1/memory/2528-16-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig behavioral1/memory/2528-17-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig behavioral1/memory/2528-18-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig behavioral1/memory/2528-19-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig behavioral1/memory/2528-20-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig behavioral1/memory/2528-21-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig behavioral1/memory/2528-22-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig behavioral1/memory/2528-23-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig behavioral1/memory/2528-24-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig behavioral1/memory/2528-25-0x000000013FDD0000-0x00000001401C2000-memory.dmp xmrig -
pid Process 1648 powershell.exe -
resource yara_rule behavioral1/memory/2528-1-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-14-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-15-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-16-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-17-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-18-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-19-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-20-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-21-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-22-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-23-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-24-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx behavioral1/memory/2528-25-0x000000013FDD0000-0x00000001401C2000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeLockMemoryPrivilege 2528 0cf3a25d268ff5ff8073bc2f4bc0227328c3e160bbd3f93c99ca64d102003f76.exe Token: SeLockMemoryPrivilege 2528 0cf3a25d268ff5ff8073bc2f4bc0227328c3e160bbd3f93c99ca64d102003f76.exe Token: SeDebugPrivilege 1648 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1648 2528 0cf3a25d268ff5ff8073bc2f4bc0227328c3e160bbd3f93c99ca64d102003f76.exe 32 PID 2528 wrote to memory of 1648 2528 0cf3a25d268ff5ff8073bc2f4bc0227328c3e160bbd3f93c99ca64d102003f76.exe 32 PID 2528 wrote to memory of 1648 2528 0cf3a25d268ff5ff8073bc2f4bc0227328c3e160bbd3f93c99ca64d102003f76.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cf3a25d268ff5ff8073bc2f4bc0227328c3e160bbd3f93c99ca64d102003f76.exe"C:\Users\Admin\AppData\Local\Temp\0cf3a25d268ff5ff8073bc2f4bc0227328c3e160bbd3f93c99ca64d102003f76.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Invoke-WebRequest "https://raw.githubusercontent.com/" "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-