Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 09:23
Behavioral task
behavioral1
Sample
e6b46989850611a2c48328687b17b82225cdbf8410a2c140c430a959bfff7bb0.exe
Resource
win7-20241010-en
windows7-x64
8 signatures
120 seconds
General
-
Target
e6b46989850611a2c48328687b17b82225cdbf8410a2c140c430a959bfff7bb0.exe
-
Size
2.8MB
-
MD5
426e1b179cae02991c22d7a3c7ce5704
-
SHA1
30717d2788c1d25fd60bee0182d0499f15d802f0
-
SHA256
e6b46989850611a2c48328687b17b82225cdbf8410a2c140c430a959bfff7bb0
-
SHA512
9a32d87fe313d67884a6527780b4489f49a3514b135a56a344044079b8d0ca5f51ef47b7cfd064af90e2667a4f2830478fa6b1394ce827851791561d34d66338
-
SSDEEP
49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1Vr5s1PTleLWrJ5O1xO:NAB3
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2220-15-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig behavioral1/memory/2220-16-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig behavioral1/memory/2220-17-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig behavioral1/memory/2220-18-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig behavioral1/memory/2220-19-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig behavioral1/memory/2220-20-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig behavioral1/memory/2220-21-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig behavioral1/memory/2220-22-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig behavioral1/memory/2220-23-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig behavioral1/memory/2220-24-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig behavioral1/memory/2220-25-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig behavioral1/memory/2220-26-0x000000013FE20000-0x0000000140212000-memory.dmp xmrig -
pid Process 932 powershell.exe -
resource yara_rule behavioral1/memory/2220-0-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-15-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-16-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-17-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-18-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-19-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-20-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-21-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-22-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-23-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-24-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-25-0x000000013FE20000-0x0000000140212000-memory.dmp upx behavioral1/memory/2220-26-0x000000013FE20000-0x0000000140212000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeLockMemoryPrivilege 2220 e6b46989850611a2c48328687b17b82225cdbf8410a2c140c430a959bfff7bb0.exe Token: SeLockMemoryPrivilege 2220 e6b46989850611a2c48328687b17b82225cdbf8410a2c140c430a959bfff7bb0.exe Token: SeDebugPrivilege 932 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2220 wrote to memory of 932 2220 e6b46989850611a2c48328687b17b82225cdbf8410a2c140c430a959bfff7bb0.exe 30 PID 2220 wrote to memory of 932 2220 e6b46989850611a2c48328687b17b82225cdbf8410a2c140c430a959bfff7bb0.exe 30 PID 2220 wrote to memory of 932 2220 e6b46989850611a2c48328687b17b82225cdbf8410a2c140c430a959bfff7bb0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6b46989850611a2c48328687b17b82225cdbf8410a2c140c430a959bfff7bb0.exe"C:\Users\Admin\AppData\Local\Temp\e6b46989850611a2c48328687b17b82225cdbf8410a2c140c430a959bfff7bb0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Invoke-WebRequest "https://raw.githubusercontent.com/" "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932
-