Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 00:22
Behavioral task
behavioral1
Sample
7064f3b2e7b0c27b874d127867a8af89668e19b3752d0da63a0e54fe6f9abc2c.exe
Resource
win7-20241010-en
5 signatures
120 seconds
General
-
Target
7064f3b2e7b0c27b874d127867a8af89668e19b3752d0da63a0e54fe6f9abc2c.exe
-
Size
1.0MB
-
MD5
2e8fd14d4494b538804d219f22428d41
-
SHA1
949ee942f6d96d49a4b06cdbbf81a58d3bffa308
-
SHA256
7064f3b2e7b0c27b874d127867a8af89668e19b3752d0da63a0e54fe6f9abc2c
-
SHA512
fff9d2aeaf680d815e16914c7c0e0dca9a0b05f924871427f87e13d663152d7cf9f4027c204399b8cb4781cb977e72557a6e9c05cadb6806b58d777116516094
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlWXWZ5PbcmC3f/jU5A:knw9oUUEEDl37jcmWHd
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2116-2-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/2116-3-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/2116-4-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/2116-5-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/2116-6-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/2116-7-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/2116-8-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/2116-9-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/2116-10-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/2116-11-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/2116-12-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/2116-13-0x000000013F940000-0x000000013FD31000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2116-0-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-2-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-3-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-4-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-5-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-6-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-7-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-8-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-9-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-10-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-11-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-12-0x000000013F940000-0x000000013FD31000-memory.dmp upx behavioral1/memory/2116-13-0x000000013F940000-0x000000013FD31000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2116 7064f3b2e7b0c27b874d127867a8af89668e19b3752d0da63a0e54fe6f9abc2c.exe Token: SeLockMemoryPrivilege 2116 7064f3b2e7b0c27b874d127867a8af89668e19b3752d0da63a0e54fe6f9abc2c.exe