Analysis
-
max time kernel
111s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 22:08
Behavioral task
behavioral1
Sample
95912dae7f49debf5b6b36d2b115c7ce151bddf54f93586e22c81c01531fd984.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
95912dae7f49debf5b6b36d2b115c7ce151bddf54f93586e22c81c01531fd984.exe
-
Size
1.2MB
-
MD5
f6110eecb4d06bd7418bb4d3b6fe6c88
-
SHA1
c188c2253c6bb4fcaeaec575f8f75c26450e17c3
-
SHA256
95912dae7f49debf5b6b36d2b115c7ce151bddf54f93586e22c81c01531fd984
-
SHA512
1d91bf06f9a893c70a9c1a1b0b6c0f2ea25f312b55a1bcea62cda98a4a7369e0df5e996ae454ce0a57972babe22f19bd3c4f33a85e8482f315d2bebc8c2ee998
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlGC78XIHbAYmXtVc9zz:knw9oUUEEDlGUJ8YStGlz
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/1044-3-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig behavioral2/memory/1044-2-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig behavioral2/memory/1044-4-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig behavioral2/memory/1044-5-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig behavioral2/memory/1044-6-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig behavioral2/memory/1044-7-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig behavioral2/memory/1044-8-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig behavioral2/memory/1044-9-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig behavioral2/memory/1044-10-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig behavioral2/memory/1044-11-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig behavioral2/memory/1044-12-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig behavioral2/memory/1044-13-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/1044-0-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-3-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-2-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-4-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-5-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-6-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-7-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-8-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-9-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-10-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-11-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-12-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx behavioral2/memory/1044-13-0x00007FF76B9A0000-0x00007FF76BD91000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1044 95912dae7f49debf5b6b36d2b115c7ce151bddf54f93586e22c81c01531fd984.exe Token: SeLockMemoryPrivilege 1044 95912dae7f49debf5b6b36d2b115c7ce151bddf54f93586e22c81c01531fd984.exe