Analysis
-
max time kernel
111s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 07:36
Behavioral task
behavioral1
Sample
37ef979d264fe7e283da3745518ffc7ae180c1b7317f0747ad5b3d73b5c687d1.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
37ef979d264fe7e283da3745518ffc7ae180c1b7317f0747ad5b3d73b5c687d1.exe
-
Size
1013KB
-
MD5
c354e540466a76f2cf5474cbe7ef80ef
-
SHA1
a437d258fa44c45b1a1c9c975dee58c02a2f07a4
-
SHA256
37ef979d264fe7e283da3745518ffc7ae180c1b7317f0747ad5b3d73b5c687d1
-
SHA512
de83baffca3d25cbc732f08dec7af020050e40c50d04f7550e2c01e0529f14b1fe53a6c1c28ec3c01284e98f64f0060bc66a9ebe906d04bd205e5b6f6b81c942
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPl+Me7bPMS5bcsf7r9KS:knw9oUUEEDl+xTMST/
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/4492-2-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig behavioral2/memory/4492-3-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig behavioral2/memory/4492-4-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig behavioral2/memory/4492-5-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig behavioral2/memory/4492-6-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig behavioral2/memory/4492-7-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig behavioral2/memory/4492-8-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig behavioral2/memory/4492-9-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig behavioral2/memory/4492-10-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig behavioral2/memory/4492-11-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig behavioral2/memory/4492-12-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig behavioral2/memory/4492-13-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/4492-0-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-2-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-3-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-4-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-5-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-6-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-7-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-8-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-9-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-10-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-11-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-12-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx behavioral2/memory/4492-13-0x00007FF62FB70000-0x00007FF62FF61000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4492 37ef979d264fe7e283da3745518ffc7ae180c1b7317f0747ad5b3d73b5c687d1.exe Token: SeLockMemoryPrivilege 4492 37ef979d264fe7e283da3745518ffc7ae180c1b7317f0747ad5b3d73b5c687d1.exe