Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 04:55
Behavioral task
behavioral1
Sample
663d5ff83c34cd1f36d14f18840213b60b943504336dc9a92e9e66e261a0aa98.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
663d5ff83c34cd1f36d14f18840213b60b943504336dc9a92e9e66e261a0aa98.exe
-
Size
1008KB
-
MD5
8f2677a73a12f4072144416dc455ae6a
-
SHA1
2ba7d3345ab87deb010229ece65279d11ad56b69
-
SHA256
663d5ff83c34cd1f36d14f18840213b60b943504336dc9a92e9e66e261a0aa98
-
SHA512
52e68a214b3e31571c11b506a060cba01d319724b156a6ca3280f95c87b646982df89bd91f4421e643ae6767a5b8067ee122762d9736ae6f557a39ca8af94786
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPl+Me7bPMS5bcsf7r9Kn:knw9oUUEEDl+xTMSTy
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2520-2-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/2520-3-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/2520-4-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/2520-5-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/2520-6-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/2520-7-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/2520-8-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/2520-9-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/2520-10-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/2520-11-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/2520-12-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/2520-13-0x000000013F0C0000-0x000000013F4B1000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2520-1-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-2-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-3-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-4-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-5-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-6-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-7-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-8-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-9-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-10-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-11-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-12-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/2520-13-0x000000013F0C0000-0x000000013F4B1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2520 663d5ff83c34cd1f36d14f18840213b60b943504336dc9a92e9e66e261a0aa98.exe Token: SeLockMemoryPrivilege 2520 663d5ff83c34cd1f36d14f18840213b60b943504336dc9a92e9e66e261a0aa98.exe