Analysis
-
max time kernel
111s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 00:22
Behavioral task
behavioral1
Sample
7064f3b2e7b0c27b874d127867a8af89668e19b3752d0da63a0e54fe6f9abc2c.exe
Resource
win7-20241010-en
5 signatures
120 seconds
General
-
Target
7064f3b2e7b0c27b874d127867a8af89668e19b3752d0da63a0e54fe6f9abc2c.exe
-
Size
1.0MB
-
MD5
2e8fd14d4494b538804d219f22428d41
-
SHA1
949ee942f6d96d49a4b06cdbbf81a58d3bffa308
-
SHA256
7064f3b2e7b0c27b874d127867a8af89668e19b3752d0da63a0e54fe6f9abc2c
-
SHA512
fff9d2aeaf680d815e16914c7c0e0dca9a0b05f924871427f87e13d663152d7cf9f4027c204399b8cb4781cb977e72557a6e9c05cadb6806b58d777116516094
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlWXWZ5PbcmC3f/jU5A:knw9oUUEEDl37jcmWHd
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/960-2-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig behavioral2/memory/960-3-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig behavioral2/memory/960-4-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig behavioral2/memory/960-5-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig behavioral2/memory/960-6-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig behavioral2/memory/960-7-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig behavioral2/memory/960-8-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig behavioral2/memory/960-9-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig behavioral2/memory/960-10-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig behavioral2/memory/960-11-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig behavioral2/memory/960-12-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig behavioral2/memory/960-13-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/960-0-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-2-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-3-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-4-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-5-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-6-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-7-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-8-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-9-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-10-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-11-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-12-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx behavioral2/memory/960-13-0x00007FF701DB0000-0x00007FF7021A1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 960 7064f3b2e7b0c27b874d127867a8af89668e19b3752d0da63a0e54fe6f9abc2c.exe Token: SeLockMemoryPrivilege 960 7064f3b2e7b0c27b874d127867a8af89668e19b3752d0da63a0e54fe6f9abc2c.exe