Analysis
-
max time kernel
102s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2025, 08:29
Behavioral task
behavioral1
Sample
2025-03-14_14f18f0f642e57b7184123be58e68858_coinminer_ismagent_ryuk_sliver.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-14_14f18f0f642e57b7184123be58e68858_coinminer_ismagent_ryuk_sliver.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-03-14_14f18f0f642e57b7184123be58e68858_coinminer_ismagent_ryuk_sliver.exe
-
Size
3.3MB
-
MD5
14f18f0f642e57b7184123be58e68858
-
SHA1
fa8ed4e04100cb091228d3c79d7f834ae6277991
-
SHA256
e7a5b8f23f136868e68a9e46c8843d69e9ba80b0117498c1699e29bdbc81d53f
-
SHA512
6d6c509ecb973b209f18d5a78ee52a3689526deb1d1ac55ad4cb5cf05cec796ac39c88a36d8612c37183da171612f919324a58db73f2d50287a43fa64eea5470
-
SSDEEP
49152:MX3YnLOQYsZfQ74C6SkgSbXP31+frjUYuHi7nT8poTMFvfuJ1kZ7NrjHQe85Qn:MlRsZ47/QXoHUOfAoj1x6n
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4016 wmic.exe Token: SeSecurityPrivilege 4016 wmic.exe Token: SeTakeOwnershipPrivilege 4016 wmic.exe Token: SeLoadDriverPrivilege 4016 wmic.exe Token: SeSystemProfilePrivilege 4016 wmic.exe Token: SeSystemtimePrivilege 4016 wmic.exe Token: SeProfSingleProcessPrivilege 4016 wmic.exe Token: SeIncBasePriorityPrivilege 4016 wmic.exe Token: SeCreatePagefilePrivilege 4016 wmic.exe Token: SeBackupPrivilege 4016 wmic.exe Token: SeRestorePrivilege 4016 wmic.exe Token: SeShutdownPrivilege 4016 wmic.exe Token: SeDebugPrivilege 4016 wmic.exe Token: SeSystemEnvironmentPrivilege 4016 wmic.exe Token: SeRemoteShutdownPrivilege 4016 wmic.exe Token: SeUndockPrivilege 4016 wmic.exe Token: SeManageVolumePrivilege 4016 wmic.exe Token: 33 4016 wmic.exe Token: 34 4016 wmic.exe Token: 35 4016 wmic.exe Token: 36 4016 wmic.exe Token: SeIncreaseQuotaPrivilege 4016 wmic.exe Token: SeSecurityPrivilege 4016 wmic.exe Token: SeTakeOwnershipPrivilege 4016 wmic.exe Token: SeLoadDriverPrivilege 4016 wmic.exe Token: SeSystemProfilePrivilege 4016 wmic.exe Token: SeSystemtimePrivilege 4016 wmic.exe Token: SeProfSingleProcessPrivilege 4016 wmic.exe Token: SeIncBasePriorityPrivilege 4016 wmic.exe Token: SeCreatePagefilePrivilege 4016 wmic.exe Token: SeBackupPrivilege 4016 wmic.exe Token: SeRestorePrivilege 4016 wmic.exe Token: SeShutdownPrivilege 4016 wmic.exe Token: SeDebugPrivilege 4016 wmic.exe Token: SeSystemEnvironmentPrivilege 4016 wmic.exe Token: SeRemoteShutdownPrivilege 4016 wmic.exe Token: SeUndockPrivilege 4016 wmic.exe Token: SeManageVolumePrivilege 4016 wmic.exe Token: 33 4016 wmic.exe Token: 34 4016 wmic.exe Token: 35 4016 wmic.exe Token: 36 4016 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4016 2160 2025-03-14_14f18f0f642e57b7184123be58e68858_coinminer_ismagent_ryuk_sliver.exe 82 PID 2160 wrote to memory of 4016 2160 2025-03-14_14f18f0f642e57b7184123be58e68858_coinminer_ismagent_ryuk_sliver.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-14_14f18f0f642e57b7184123be58e68858_coinminer_ismagent_ryuk_sliver.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-14_14f18f0f642e57b7184123be58e68858_coinminer_ismagent_ryuk_sliver.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4016
-