Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 09:47
Behavioral task
behavioral1
Sample
578bfc54c82347dd32f1f5ab785747069cb32e72df8c2c498391bd8a4ca0bb0c.exe
Resource
win7-20240729-en
windows7-x64
5 signatures
120 seconds
General
-
Target
578bfc54c82347dd32f1f5ab785747069cb32e72df8c2c498391bd8a4ca0bb0c.exe
-
Size
1.6MB
-
MD5
b87b4b9797943ec7573b4ef2397c313d
-
SHA1
251be7e56ae6d4c336f75bd9a3920bf988e10f8e
-
SHA256
578bfc54c82347dd32f1f5ab785747069cb32e72df8c2c498391bd8a4ca0bb0c
-
SHA512
7c1b7eef2d6b3f3266a7ecfea9203ee72b97cd74700b0a17d9b34b753b42d610ddeec036fc79e753faedfbf71263b9ec9b32ce2dd9be903dda291ca1f3c18706
-
SSDEEP
24576:RVIl/WDGCi7/qkatXBF6727HeoPO+XC7A9GaF2UdJwUkw3jv0FXbzQppj+r+BgiK:ROdWCCi7/rahOY2UrwUveeFifE83
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/1072-2-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1072-3-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1072-4-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1072-5-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1072-6-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1072-7-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1072-8-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1072-9-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1072-10-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1072-11-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1072-12-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1072-13-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/1072-0-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-2-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-3-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-4-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-5-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-6-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-7-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-8-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-9-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-10-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-11-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-12-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1072-13-0x000000013F4F0000-0x000000013F841000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1072 578bfc54c82347dd32f1f5ab785747069cb32e72df8c2c498391bd8a4ca0bb0c.exe Token: SeLockMemoryPrivilege 1072 578bfc54c82347dd32f1f5ab785747069cb32e72df8c2c498391bd8a4ca0bb0c.exe