Analysis
-
max time kernel
110s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 00:06
Behavioral task
behavioral1
Sample
71598c6d66d482dce25a1c951e6e6fcc20faa251c1147c7ee5329bd9db64a184.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
71598c6d66d482dce25a1c951e6e6fcc20faa251c1147c7ee5329bd9db64a184.exe
-
Size
1.4MB
-
MD5
77c1929cf9eecc5013aa089174d0631f
-
SHA1
fe3b77c7b4560b9d3f947310f348e95d8bf126af
-
SHA256
71598c6d66d482dce25a1c951e6e6fcc20faa251c1147c7ee5329bd9db64a184
-
SHA512
91985d51eca1ad0e9c3ca537495701faf0c1a1d43f4f2b086aaa35085d41523209020ebb15da20e951be760a1a0055acc9aae1ec63b27a91b69578a97d239fd2
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlWXWZ5Pbcq92zjP+sjI1K3bKWeEpCcQ3JnFX:knw9oUUEEDl37jcq4nPUE+x
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/2588-2-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig behavioral2/memory/2588-3-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig behavioral2/memory/2588-4-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig behavioral2/memory/2588-5-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig behavioral2/memory/2588-6-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig behavioral2/memory/2588-7-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig behavioral2/memory/2588-8-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig behavioral2/memory/2588-9-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig behavioral2/memory/2588-10-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig behavioral2/memory/2588-11-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig behavioral2/memory/2588-12-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig behavioral2/memory/2588-13-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/2588-0-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-2-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-3-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-4-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-5-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-6-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-7-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-8-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-9-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-10-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-11-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-12-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx behavioral2/memory/2588-13-0x00007FF68C0C0000-0x00007FF68C4B1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2588 71598c6d66d482dce25a1c951e6e6fcc20faa251c1147c7ee5329bd9db64a184.exe Token: SeLockMemoryPrivilege 2588 71598c6d66d482dce25a1c951e6e6fcc20faa251c1147c7ee5329bd9db64a184.exe