Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02/02/2025, 16:25
Behavioral task
behavioral1
Sample
fb1a1c3f88f78c2954efb5a663560b5a3caa2f457e001bfa5110497ddab7f0a2.exe
Resource
win7-20241023-en
5 signatures
120 seconds
General
-
Target
fb1a1c3f88f78c2954efb5a663560b5a3caa2f457e001bfa5110497ddab7f0a2.exe
-
Size
1.2MB
-
MD5
4c46e71a72a714d08e89f1dcfeb5811e
-
SHA1
770562cfb85720f5cc1c65f9eed332249ba45ef7
-
SHA256
fb1a1c3f88f78c2954efb5a663560b5a3caa2f457e001bfa5110497ddab7f0a2
-
SHA512
c11e38256bb1df0d604e3392eb225d4d792ec747138d5eb4cf23efda2ddfd978996ed9a7b7501fbe090aec04a3aa42369a432faafca9453d77a2d3f76a18e3c0
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlOqzJO0RD/J54y9K6WdWLLH:knw9oUUEEDlOuJnRRoS
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/2416-2-0x000000013F480000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2416-3-0x000000013F480000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2416-4-0x000000013F480000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2416-5-0x000000013F480000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2416-6-0x000000013F480000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2416-7-0x000000013F480000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2416-8-0x000000013F480000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2416-9-0x000000013F480000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2416-10-0x000000013F480000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2416-11-0x000000013F480000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2416-12-0x000000013F480000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2416-13-0x000000013F480000-0x000000013F871000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2416-0-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-2-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-3-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-4-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-5-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-6-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-7-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-8-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-9-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-10-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-11-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-12-0x000000013F480000-0x000000013F871000-memory.dmp upx behavioral1/memory/2416-13-0x000000013F480000-0x000000013F871000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2416 fb1a1c3f88f78c2954efb5a663560b5a3caa2f457e001bfa5110497ddab7f0a2.exe Token: SeLockMemoryPrivilege 2416 fb1a1c3f88f78c2954efb5a663560b5a3caa2f457e001bfa5110497ddab7f0a2.exe