Analysis
-
max time kernel
110s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 00:50
Behavioral task
behavioral1
Sample
8041130b979b7a6fc5b3426f0de5c14a519ae94efd18f2fcd3e1aec49e4c08e6.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
8041130b979b7a6fc5b3426f0de5c14a519ae94efd18f2fcd3e1aec49e4c08e6.exe
-
Size
1.1MB
-
MD5
241d176220ce7b10814d62b77759aad1
-
SHA1
2933a9ed88405e9e084b7098c16e6c5d5c283338
-
SHA256
8041130b979b7a6fc5b3426f0de5c14a519ae94efd18f2fcd3e1aec49e4c08e6
-
SHA512
34d0f1c676063e643206ab5e3d6f19f8d6c5b702289ba6a6a14c536dea89337394769c9fb6fc86452cdd2253fed4f7a09a37e49d32640228c35c1de5cf5e4481
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlgQ5aILMCfmAU7jEvL:knw9oUUEEDld5aIwC+Acc
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2068-2-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2068-3-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2068-4-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2068-5-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2068-6-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2068-7-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2068-8-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2068-9-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2068-10-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2068-11-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2068-12-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2068-13-0x000000013F980000-0x000000013FD71000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2068-0-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-2-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-3-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-4-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-5-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-6-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-7-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-8-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-9-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-10-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-11-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-12-0x000000013F980000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2068-13-0x000000013F980000-0x000000013FD71000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2068 8041130b979b7a6fc5b3426f0de5c14a519ae94efd18f2fcd3e1aec49e4c08e6.exe Token: SeLockMemoryPrivilege 2068 8041130b979b7a6fc5b3426f0de5c14a519ae94efd18f2fcd3e1aec49e4c08e6.exe