Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 00:58
Behavioral task
behavioral1
Sample
434a2a4cc2a6aa936e9aaf049b73ef2a898c55cfba35e1b8d1c421dd07e9827f.exe
Resource
win7-20241010-en
5 signatures
120 seconds
General
-
Target
434a2a4cc2a6aa936e9aaf049b73ef2a898c55cfba35e1b8d1c421dd07e9827f.exe
-
Size
1.2MB
-
MD5
4d50e147fd2a120409c8c72abfe11b8a
-
SHA1
0f4b690f037a578eb23973399b85f506f3a6a349
-
SHA256
434a2a4cc2a6aa936e9aaf049b73ef2a898c55cfba35e1b8d1c421dd07e9827f
-
SHA512
b67f4ba63a3ab39e93e6a0c830c9271c83e4b25fa217a0047396399dc319abc94f317ea350ba51aaa3c3256acc5155063fae9fc2222651ab3cc5910707f8d9e1
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlGC78XIHbAYmXtVc9M:knw9oUUEEDlGUJ8YStGG
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2572-3-0x000000013F140000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2572-2-0x000000013F140000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2572-4-0x000000013F140000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2572-5-0x000000013F140000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2572-6-0x000000013F140000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2572-7-0x000000013F140000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2572-8-0x000000013F140000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2572-9-0x000000013F140000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2572-10-0x000000013F140000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2572-11-0x000000013F140000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2572-12-0x000000013F140000-0x000000013F531000-memory.dmp xmrig behavioral1/memory/2572-13-0x000000013F140000-0x000000013F531000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2572-1-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-3-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-2-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-4-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-5-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-6-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-7-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-8-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-9-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-10-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-11-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-12-0x000000013F140000-0x000000013F531000-memory.dmp upx behavioral1/memory/2572-13-0x000000013F140000-0x000000013F531000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2572 434a2a4cc2a6aa936e9aaf049b73ef2a898c55cfba35e1b8d1c421dd07e9827f.exe Token: SeLockMemoryPrivilege 2572 434a2a4cc2a6aa936e9aaf049b73ef2a898c55cfba35e1b8d1c421dd07e9827f.exe