Analysis
-
max time kernel
110s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 18:21
Behavioral task
behavioral1
Sample
cb5696fd0555e8512a5532d6119e4bf480f23d2f3e2fb2e44921cc5ddfe2cddd.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
cb5696fd0555e8512a5532d6119e4bf480f23d2f3e2fb2e44921cc5ddfe2cddd.exe
-
Size
1.6MB
-
MD5
c7e34b96c3f658906ae29b86c790b4da
-
SHA1
8ea931484b30c4ddbece9814a55803bee7896cfe
-
SHA256
cb5696fd0555e8512a5532d6119e4bf480f23d2f3e2fb2e44921cc5ddfe2cddd
-
SHA512
ddaa9bf4d19a9ffa44cf7f32d2f472e9ffbc6d9859cfef2b82b2d9881a20f29321630d8bb8752c5f42620591af931a4270f21a657dd13b8e05a90be8a9a81ad3
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlWXWZ5PbcmC3f/DFNkTQbOF+sabpZJ7qOt6XlsHfo:knw9oUUEEDl37jcmWH/xbnb/btz/o
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/1828-2-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig behavioral2/memory/1828-3-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig behavioral2/memory/1828-4-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig behavioral2/memory/1828-5-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig behavioral2/memory/1828-6-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig behavioral2/memory/1828-7-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig behavioral2/memory/1828-8-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig behavioral2/memory/1828-9-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig behavioral2/memory/1828-10-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig behavioral2/memory/1828-11-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig behavioral2/memory/1828-12-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig behavioral2/memory/1828-13-0x00007FF795710000-0x00007FF795B01000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/1828-0-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-2-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-3-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-4-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-5-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-6-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-7-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-8-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-9-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-10-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-11-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-12-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx behavioral2/memory/1828-13-0x00007FF795710000-0x00007FF795B01000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1828 cb5696fd0555e8512a5532d6119e4bf480f23d2f3e2fb2e44921cc5ddfe2cddd.exe Token: SeLockMemoryPrivilege 1828 cb5696fd0555e8512a5532d6119e4bf480f23d2f3e2fb2e44921cc5ddfe2cddd.exe