Analysis
-
max time kernel
110s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 23:42
Behavioral task
behavioral1
Sample
0268d449af704d76f745d38265f94ba39d23528a38dd532540ca0d1ccdea171e.exe
Resource
win7-20241010-en
5 signatures
120 seconds
General
-
Target
0268d449af704d76f745d38265f94ba39d23528a38dd532540ca0d1ccdea171e.exe
-
Size
1.0MB
-
MD5
6ba4500e6b0e998137402fe264d11177
-
SHA1
8ae17bebf8a5cce5ccf843db66071db2a3029481
-
SHA256
0268d449af704d76f745d38265f94ba39d23528a38dd532540ca0d1ccdea171e
-
SHA512
1979e6789f34ed569be281f3cdba73234ad24f1af2ecf40b961fc3100150c583ba305541e94953647944839ecf6d9e2bae3282083e41aaa6cb54c6ff6d945ae0
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlWXWZ5Pbcq92zoxgTI:knw9oUUEEDl37jcq4xI
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2848-2-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2848-3-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2848-4-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2848-5-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2848-6-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2848-7-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2848-8-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2848-9-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2848-10-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2848-11-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2848-12-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2848-13-0x000000013FCD0000-0x00000001400C1000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2848-1-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-2-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-3-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-4-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-5-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-6-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-7-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-8-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-9-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-10-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-11-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-12-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2848-13-0x000000013FCD0000-0x00000001400C1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2848 0268d449af704d76f745d38265f94ba39d23528a38dd532540ca0d1ccdea171e.exe Token: SeLockMemoryPrivilege 2848 0268d449af704d76f745d38265f94ba39d23528a38dd532540ca0d1ccdea171e.exe