Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/02/2025, 14:07
Behavioral task
behavioral1
Sample
191638049eb03cc9d0d65f266648ce90301c5cd964c91277e4e6ef603e5f4bca.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
191638049eb03cc9d0d65f266648ce90301c5cd964c91277e4e6ef603e5f4bca.exe
-
Size
1.0MB
-
MD5
ca5b0b8c7b39453c7ad13f1b16f5b78f
-
SHA1
6d2e8191f271ff93bb3efae092bc806da9945873
-
SHA256
191638049eb03cc9d0d65f266648ce90301c5cd964c91277e4e6ef603e5f4bca
-
SHA512
e86b46cc39c3f147c014444a8e50e4511a29cf2ad5b74e0bf029b8c8a96ab0e195950200c9ca9a28807c222d8f11fed35f3aebf4a20de3cae9c395c9729a1d0f
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlWXWZ5PbcmC3f/jU5S:knw9oUUEEDl37jcmWH7
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2380-2-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2380-3-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2380-4-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2380-5-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2380-6-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2380-7-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2380-8-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2380-9-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2380-10-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2380-11-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2380-12-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2380-13-0x000000013FEB0000-0x00000001402A1000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2380-0-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-2-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-3-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-4-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-5-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-6-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-7-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-8-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-9-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-10-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-11-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-12-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2380-13-0x000000013FEB0000-0x00000001402A1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2380 191638049eb03cc9d0d65f266648ce90301c5cd964c91277e4e6ef603e5f4bca.exe Token: SeLockMemoryPrivilege 2380 191638049eb03cc9d0d65f266648ce90301c5cd964c91277e4e6ef603e5f4bca.exe