Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_416.exe

Overview

General Information

Sample name:LisectAVT_2403002A_416.exe
Analysis ID:1481047
MD5:a638c42d9952eb79dda11c2895bb9e3d
SHA1:dd079c7cb8e89203b995c1cd4a5908effe3ff663
SHA256:a76a0fc6a1da492c092cc494e77b8ac0578741d0bbc32dbd865c7970389a67cd
Tags:exe
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Detected Stratum mining protocol
Found direct / indirect Syscall (likely to bypass EDR)
Found strings related to Crypto-Mining
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Potential thread-based time evasion detected
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Detected potential crypto function
Entry point lies outside standard sections
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • LisectAVT_2403002A_416.exe (PID: 7540 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_416.exe" MD5: A638C42D9952EB79DDA11C2895BB9E3D)
    • conhost.exe (PID: 7588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 8124 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.3847942578.00000000005A4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpMacOS_Cryptominer_Xmrig_241780a1unknownunknown
        • 0x134b10:$a1: mining.set_target
        • 0x12bb30:$a2: XMRIG_HOSTNAME
        • 0x131408:$a3: Usage: xmrig [OPTIONS]
        • 0x12bb08:$a4: XMRIG_VERSION
        Process Memory Space: LisectAVT_2403002A_416.exe PID: 7540JoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          Process Memory Space: LisectAVT_2403002A_416.exe PID: 7540MacOS_Cryptominer_Xmrig_241780a1unknownunknown
          • 0x7cad8:$a1: mining.set_target
          • 0x77dad:$a2: XMRIG_HOSTNAME
          • 0x797f0:$a3: Usage: xmrig [OPTIONS]
          • 0x77d8e:$a4: XMRIG_VERSION

          System Summary

          barindex
          Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, ProcessId: 8124, ProcessName: svchost.exe
          No Snort rule has matched
          Timestamp:2024-07-25T03:30:19.335638+0200
          SID:2022930
          Source Port:443
          Destination Port:49708
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:2024-07-25T03:29:38.575377+0200
          SID:2022930
          Source Port:443
          Destination Port:49705
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:2024-07-25T03:29:16.239082+0200
          SID:2826930
          Source Port:49707
          Destination Port:80
          Protocol:TCP
          Classtype:Crypto Currency Mining Activity Detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: LisectAVT_2403002A_416.exeAvira: detected
          Source: auto.c3pool.orgVirustotal: Detection: 8%Perma Link
          Source: LisectAVT_2403002A_416.exeReversingLabs: Detection: 39%
          Source: LisectAVT_2403002A_416.exeVirustotal: Detection: 41%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
          Source: LisectAVT_2403002A_416.exeJoe Sandbox ML: detected

          Bitcoin Miner

          barindex
          Source: Yara matchFile source: dump.pcap, type: PCAP
          Source: Yara matchFile source: 00000000.00000002.3847942578.00000000005A4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_416.exe PID: 7540, type: MEMORYSTR
          Source: global trafficTCP traffic: 192.168.2.8:49707 -> 5.75.158.61:80 payload: data raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6c 6f 67 69 6e 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 6c 6f 67 69 6e 22 3a 22 38 42 66 78 69 52 50 59 31 67 71 32 6b 45 67 53 47 47 4c 31 75 51 4e 75 6f 59 47 51 42 58 54 6d 54 31 65 46 62 38 76 42 56 34 31 62 45 6f 43 43 58 58 41 61 66 61 6f 52 51 59 74 52 58 66 70 6b 6f 7a 4b 6e 41 54 67 48 38 7a 76 36 39 36 67 59 70 45 68 4b 64 6e 32 71 38 68 45 70 69 4b 77 22 2c 22 70 61 73 73 22 3a 22 6d 79 79 65 72 70 22 2c 22 61 67 65 6e 74 22 3a 22 58 4d 52 69 67 2f 36 2e 31 39 2e 32 20 28 57 69 6e 64 6f 77 73 20 4e 54 20 31 30 2e 30 3b 20 57 69 6e 36 34 3b 20 78 36 34 29 20 6c 69 62 75 76 2f 31 2e 33 31 2e 30 20 6d 73 76 63 2f 32 30 31 37 22 2c 22 61 6c 67 6f 22 3a 5b 22 63 6e 2f 31 22 2c 22 63 6e 2f 32 22 2c 22 63 6e 2f 72 22 2c 22 63 6e 2f 66 61 73 74 22 2c 22 63 6e 2f 68 61 6c 66 22 2c 22 63 6e 2f 78 61 6f 22 2c 22 63 6e 2f 72 74 6f 22 2c 22 63 6e 2f 72 77 7a 22 2c 22 63 6e 2f 7a 6c 73 22 2c 22 63 6e 2f 64 6f 75 62 6c 65 22 2c 22 63 6e 2f 63 63 78 22 2c 22 63 6e 2d 6c 69 74 65 2f 31 22 2c 22 63 6e 2d 68 65 61 76 79 2f 30 22 2c 22 63 6e 2d 68 65 61 76 79 2f 74 75 62 65 22 2c 22 63 6e 2d 68 65 61 76 79 2f 78 68 76 22 2c 22 63 6e 2d 70 69 63 6f 22 2c 22 63 6e 2d 70 69 63 6f 2f 74 6c 6f 22 2c 22 63 6e 2f 75 70 78 32 22 2c 22 72 78 2f 30 22 2c 22 72 78 2f 77 6f 77 22 2c 22 72 78 2f 61 72 71 22 2c 22 72 78 2f 67 72 61 66 74 22 2c 22 72 78 2f 73 66 78 22 2c 22 72 78 2f 6b 65 76 61 22 2c 22 61 72 67 6f 6e 32 2f 63 68 75 6b 77 61 22 2c 22 61 72 67 6f 6e 32 2f 63 68 75 6b 77 61 76 32 22 2c 22 61 72 67 6f 6e 32 2f 6e 69 6e 6a 61 22 2c 22 67 68 6f 73 74 72 69 64 65 72 22 5d 7d 7d 0a data ascii: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"8bfxirpy1gq2kegsggl1uqnuoygqbxtmt1efb8vbv41beoccxxaafaorqytrxfpkozknatgh8zv696gypehkdn2q8hepikw","pass":"myyerp","agent":"xmrig/6.19.2 (windows nt 10.0; win64; x64) libuv/1.31.0 msvc/2017","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"]}}
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: stratum+ssl://
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: "url": "monerohash.com:80",
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: cryptonight/0
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: -o, --url=URL URL of mining server
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: XMRig 6.19.2
          Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: auto.c3pool.org
          Source: ~DFEB4C8172AFF7D925.TMP.0.drString found in binary or memory: http://pro.corbis.com/search/searchresults.asp?txt=42-17167222&openImage=42-171672228BIM
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://xmrig.com/benchmark/%s
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://xmrig.com/docs/algorithms
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://xmrig.com/wizard

          System Summary

          barindex
          Source: 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
          Source: Process Memory Space: LisectAVT_2403002A_416.exe PID: 7540, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_00581A480_2_00581A48
          Source: LisectAVT_2403002A_416.exeStatic PE information: Number of sections : 15 > 10
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1659074573.00000000004E0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamejava.exe\: vs LisectAVT_2403002A_416.exe
          Source: LisectAVT_2403002A_416.exe, 00000000.00000000.1387081246.0000000140808000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamejava.exe\: vs LisectAVT_2403002A_416.exe
          Source: LisectAVT_2403002A_416.exeBinary or memory string: OriginalFilenamejava.exe\: vs LisectAVT_2403002A_416.exe
          Source: 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
          Source: Process Memory Space: LisectAVT_2403002A_416.exe PID: 7540, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
          Source: LisectAVT_2403002A_416.exeStatic PE information: Section: ZLIB complexity 1.0071614583333333
          Source: LisectAVT_2403002A_416.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
          Source: classification engineClassification label: mal100.evad.mine.winEXE@3/1@1/1
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7588:120:WilError_03
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeFile created: C:\Users\user\AppData\Local\Temp\~DFEB4C8172AFF7D925.TMPJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: LisectAVT_2403002A_416.exeReversingLabs: Detection: 39%
          Source: LisectAVT_2403002A_416.exeVirustotal: Detection: 41%
          Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_416.exe "C:\Users\user\Desktop\LisectAVT_2403002A_416.exe"
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: asycfilt.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: explorerframe.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
          Source: LisectAVT_2403002A_416.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: LisectAVT_2403002A_416.exeStatic file information: File size 8455189 > 1048576
          Source: LisectAVT_2403002A_416.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x17e800
          Source: LisectAVT_2403002A_416.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x5cec00
          Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
          Source: LisectAVT_2403002A_416.exeStatic PE information: real checksum: 0x812fd3 should be: 0x812fd8
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name:
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name: .themida
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name: .boot
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_0014D790 pushad ; retf 0_2_0014D831
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_0014EC12 push ebp; retf 0_2_0014EC23
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_0014EB01 push ebp; retf 0_2_0014EB23
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_0014FF23 push ebp; retf 0_2_0014FF2B
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_0058964A push eax; retf 0_2_0058966A
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_005810CC push esp; retf 0_2_005810DB
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_00589740 pushad ; ret 0_2_00589741
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_00583302 push esp; retf 0_2_0058334B
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_00582D7A push esp; retf 0_2_00582D7B
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_00580DE9 push ebp; retf 0_2_005810CB
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_00582CA9 push esp; retf 0_2_00582CB3
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_00587020 pushad ; ret 0_2_00587021
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeCode function: 0_2_0211FBE8 push ebp; retf 0_2_0211FF2B
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name: entropy: 7.82486117848576
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name: entropy: 7.863282666933349
          Source: LisectAVT_2403002A_416.exeStatic PE information: section name: entropy: 7.760464066702744

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeWindow searched: window name: RegmonClassJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeWindow searched: window name: FilemonClassJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Initial fileSignature Results: Thread-based counter
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSystem information queried: FirmwareTableInformationJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSystem information queried: FirmwareTableInformationJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1679209230.00000000005A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
          Source: LisectAVT_2403002A_416.exe, 00000000.00000003.1679209230.00000000005A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
          Source: LisectAVT_2403002A_416.exe, 00000000.00000002.3848285737.0000000002616000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeSystem information queried: ModuleInformationJump to behavior

          Anti Debugging

          barindex
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeOpen window title or class name: regmonclass
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeOpen window title or class name: procmon_window_class
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeOpen window title or class name: filemonclass
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeProcess queried: DebugObjectHandleJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeProcess queried: DebugPortJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeNtQueryInformationProcess: Indirect: 0x140DC6747Jump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeNtQueryInformationProcess: Indirect: 0x140E12806Jump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeNtSetInformationThread: Indirect: 0x140E1206CJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002A_416.exeNtQuerySystemInformation: Indirect: 0x140DC14F9Jump to behavior
          Source: conhost.exe, 00000002.00000002.3848582527.000002231E220000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: conhost.exe, 00000002.00000002.3848582527.000002231E220000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: conhost.exe, 00000002.00000002.3848582527.000002231E220000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 0Program Manager
          Source: conhost.exe, 00000002.00000002.3848582527.000002231E220000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          2
          Process Injection
          32
          Virtualization/Sandbox Evasion
          OS Credential Dumping721
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Abuse Elevation Control Mechanism
          2
          Process Injection
          LSASS Memory32
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          1
          Abuse Elevation Control Mechanism
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
          Obfuscated Files or Information
          NTDS12
          System Information Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
          Software Packing
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          LisectAVT_2403002A_416.exe39%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
          LisectAVT_2403002A_416.exe41%VirustotalBrowse
          LisectAVT_2403002A_416.exe100%AviraHEUR/AGEN.1309090
          LisectAVT_2403002A_416.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          auto.c3pool.org9%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://xmrig.com/benchmark/%s0%Avira URL Cloudsafe
          http://pro.corbis.com/search/searchresults.asp?txt=42-17167222&openImage=42-171672228BIM0%Avira URL Cloudsafe
          https://xmrig.com/docs/algorithms0%Avira URL Cloudsafe
          https://xmrig.com/wizard0%Avira URL Cloudsafe
          http://pro.corbis.com/search/searchresults.asp?txt=42-17167222&openImage=42-171672228BIM0%VirustotalBrowse
          https://xmrig.com/wizard1%VirustotalBrowse
          https://xmrig.com/benchmark/%s1%VirustotalBrowse
          https://xmrig.com/docs/algorithms2%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          auto.c3pool.org
          5.75.158.61
          truetrueunknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://xmrig.com/benchmark/%sLisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://xmrig.com/wizardLisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://pro.corbis.com/search/searchresults.asp?txt=42-17167222&openImage=42-171672228BIM~DFEB4C8172AFF7D925.TMP.0.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://xmrig.com/docs/algorithmsLisectAVT_2403002A_416.exe, 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmpfalse
          • 2%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          5.75.158.61
          auto.c3pool.orgGermany
          24940HETZNER-ASDEtrue
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1481047
          Start date and time:2024-07-25 03:28:26 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 32s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:10
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:LisectAVT_2403002A_416.exe
          Detection:MAL
          Classification:mal100.evad.mine.winEXE@3/1@1/1
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240s for sample files taking high CPU consumption
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target LisectAVT_2403002A_416.exe, PID 7540 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          TimeTypeDescription
          21:29:48API Interceptor1x Sleep call for process: LisectAVT_2403002A_416.exe modified
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          auto.c3pool.orgo00DuIdf3j.exeGet hashmaliciousXmrigBrowse
          • 5.75.158.61
          o00DuIdf3j.exeGet hashmaliciousXmrigBrowse
          • 5.75.158.61
          xB6r0wPRyb.exeGet hashmaliciousXmrigBrowse
          • 5.75.158.61
          K4gsPJGEi4.exeGet hashmaliciousXmrigBrowse
          • 5.75.158.61
          x00zm3KVwb.exeGet hashmaliciousXmrigBrowse
          • 88.198.117.174
          4xHN38uqxB.exeGet hashmaliciousDoublePulsar, ETERNALBLUE, XmrigBrowse
          • 5.161.70.189
          UO2z4n1Sxx.exeGet hashmaliciousUnknownBrowse
          • 88.198.117.174
          4xHN38uqxB.exeGet hashmaliciousXmrigBrowse
          • 88.198.117.174
          c3p.exeGet hashmaliciousXmrigBrowse
          • 88.198.117.174
          SecuriteInfo.com.FileRepMalware.25283.7828.exeGet hashmaliciousBlackMoonBrowse
          • 5.161.70.189
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          HETZNER-ASDELisectAVT_2403002A_180.exeGet hashmaliciousPolyRansomBrowse
          • 144.76.195.253
          f84038a5c35557bb57839423dcab27287ac5ab490fca503f496df61da5e2bc99.exeGet hashmaliciousBdaejec, VidarBrowse
          • 5.161.21.185
          EF48AEBC0F1E77208BBCD5206C58678BB1181994507D1084E1D324DCA9D5D3B8.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
          • 188.40.141.211
          E6D881EA9A11D23E31737469C38C5C74DE54ADC680A662D877C6CAB46E3A34AB.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
          • 188.40.141.211
          D9B72DA68DB9EB3D54BFD70C71F9A07EF222B7D9662DE35E74BA080B473DF4E2.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
          • 188.40.141.211
          https://r1s5ysq3czg5vii7sy3amdlrggobbqdod4rcuy0ul3qxlie.pages.dev/Get hashmaliciousUnknownBrowse
          • 195.201.57.90
          C7F05A51EF9CD4372057583AF5DDEF7EA41D377ECBDB06AA604DE8B59F277BD5.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
          • 188.40.141.211
          https://kohojoiy.pages.dev/Get hashmaliciousTechSupportScamBrowse
          • 195.201.57.90
          C80F5360D6E3484FF09BD86186BAFFA361803879E40CEAA9AF984CDF68FFEA5B.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
          • 188.40.141.211
          C5665332E8CA3D76FB4B583B3FF97D1F99828F33CAD445B22020147BF9079F59.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
          • 188.40.141.211
          No context
          No context
          Process:C:\Users\user\Desktop\LisectAVT_2403002A_416.exe
          File Type:Composite Document File V2 Document, Cannot read section info
          Category:dropped
          Size (bytes):901120
          Entropy (8bit):7.918798349397588
          Encrypted:false
          SSDEEP:24576:2x5cyLzoy4z5LPrMcs5dmYOYFQn1s97QJv8wB:2zbL0zzJsKJS1QJv8wB
          MD5:6DE502CDFAD448559A118D514AAC5330
          SHA1:1BE69DECA1924590B2739956F1A5BAB203C73AB4
          SHA-256:1A254CD8A09B66710CBF518F4CE13E2C30C826883DC5E7EDCB00BF1CF7C89C7C
          SHA-512:2B2F86C32A0233477058888CD737937F989F1240A3B960B0D4543FB7AF8388EBBF491C341B28E874D386C119936384EAC0A12FBC657F09205C934E6AE5A65436
          Malicious:false
          Reputation:low
          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          File type:PE32+ executable (console) x86-64, for MS Windows
          Entropy (8bit):7.953851395208518
          TrID:
          • Win64 Executable Console (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:LisectAVT_2403002A_416.exe
          File size:8'455'189 bytes
          MD5:a638c42d9952eb79dda11c2895bb9e3d
          SHA1:dd079c7cb8e89203b995c1cd4a5908effe3ff663
          SHA256:a76a0fc6a1da492c092cc494e77b8ac0578741d0bbc32dbd865c7970389a67cd
          SHA512:b74ebf3994b96e6b895a957e032a3ba230b9053e7aad4bc58e303fdc03bf925c3e74aeac0f5e9538f11828caaf21c0254eeff3d5d84b005920f103812d885ec2
          SSDEEP:196608:zj+WCUnpqJ6p09Sz/qNybHf71LfMETK4oLsA91ZEd:zK15op0Aq+DuywW
          TLSH:A78633215004BDD2D8439372D81D21B14983EED6CB90262C2A6F77F7663BB3D432E76A
          File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$..........}\w..\w..\w....U.Qw....W..w....V.}w....c.Xw...../Uw...../.w...../zw....j.]w...../Nw....o.Kw..\w..6v...../hu...../zv...../_w.
          Icon Hash:d08c8e8ea2868a54
          Entrypoint:0x140f7c058
          Entrypoint Section:.boot
          Digitally signed:false
          Imagebase:0x140000000
          Subsystem:windows cui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
          Time Stamp:0x65F2A76F [Thu Mar 14 07:29:51 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:62dc84212c31dc6fad4d7cd91eeaf282
          Instruction
          call 00007F5E64EFD8C7h
          inc ecx
          push edx
          dec ecx
          mov edx, esp
          inc ecx
          push edx
          dec ecx
          mov esi, dword ptr [edx+10h]
          dec ecx
          mov edi, dword ptr [edx+20h]
          cld
          mov dl, 80h
          mov al, byte ptr [esi]
          dec eax
          inc esi
          mov byte ptr [edi], al
          dec eax
          inc edi
          mov ebx, 00000002h
          add dl, dl
          jne 00007F5E64EFD749h
          mov dl, byte ptr [esi]
          dec eax
          inc esi
          adc dl, dl
          jnc 00007F5E64EFD726h
          add dl, dl
          jne 00007F5E64EFD749h
          mov dl, byte ptr [esi]
          dec eax
          inc esi
          adc dl, dl
          jnc 00007F5E64EFD7A0h
          xor eax, eax
          add dl, dl
          jne 00007F5E64EFD749h
          mov dl, byte ptr [esi]
          dec eax
          inc esi
          adc dl, dl
          jnc 00007F5E64EFD848h
          add dl, dl
          jne 00007F5E64EFD749h
          mov dl, byte ptr [esi]
          dec eax
          inc esi
          adc dl, dl
          adc eax, eax
          add dl, dl
          jne 00007F5E64EFD749h
          mov dl, byte ptr [esi]
          dec eax
          inc esi
          adc dl, dl
          adc eax, eax
          add dl, dl
          jne 00007F5E64EFD749h
          mov dl, byte ptr [esi]
          dec eax
          inc esi
          adc dl, dl
          adc eax, eax
          add dl, dl
          jne 00007F5E64EFD749h
          mov dl, byte ptr [esi]
          dec eax
          inc esi
          adc dl, dl
          adc eax, eax
          je 00007F5E64EFD74Bh
          push edi
          mov eax, eax
          dec eax
          sub edi, eax
          mov al, byte ptr [edi]
          pop edi
          mov byte ptr [edi], al
          dec eax
          inc edi
          mov ebx, 00000002h
          jmp 00007F5E64EFD6CAh
          mov eax, 00000001h
          add dl, dl
          jne 00007F5E64EFD749h
          mov dl, byte ptr [esi]
          dec eax
          inc esi
          adc dl, dl
          adc eax, eax
          add dl, dl
          jne 00007F5E64EFD749h
          mov dl, byte ptr [esi]
          dec eax
          inc esi
          adc dl, dl
          jc 00007F5E64EFD728h
          sub eax, ebx
          mov ebx, 00000001h
          jne 00007F5E64EFD770h
          mov ecx, 00000001h
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x8061520x1a8.idata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x8080000x7c64.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0xf57e240x2160c.themida
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x154b0000x10.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x8070380x28.tls
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          0x10000x390cb00x17e800f9196c7a3c5e3972e5bd3a5ec909a4caunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          0x3920000x189ade0x9b800b43a514cee2bd48a30c17a121f49f4f2False0.9882843900723473data7.966005657903704IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          0x51c0000x2b0e400x4000378910a41f28a360fa928fb93796bb19unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          0x7cd0000x215f40x13600226a4ca4576d14aeeba9d9b8830f550aFalse0.9360383064516129data7.5564434755852306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          0x7ef0000xc560x6008951c31e0aa85d5039aca6ac4b3ea0b3False1.0071614583333333data7.82486117848576IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          0x7f00000x26d10x1000b60f10f7518c1782ed15924495aa9a99False0.982177734375data7.863282666933349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          0x7f30000x11840xa007855674421ed69b1d80c2ce573813742False0.953125data7.760464066702744IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          0x7f50000x7c5d0x2c00cde7e96871a34c8c2b4693e72f98990bFalse0.978515625data7.918442353501549IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          0x7fd0000x87c00x2c006dc35de255644724a843e2f4cea80c24False0.9123757102272727data7.771933692856027IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          .idata0x8060000x10000x4006cb4797928c34927778345fc13871892False0.333984375data3.0191147950274106IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .tls0x8070000x10000x2007736d593dc1d638a984bfb118305285bFalse0.07421875data0.3504830562941642IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x8080000x7e000x7e00f409092efe7be741d423fab80ac9d207False0.34269593253968256data5.8433975701342105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .themida0x8100000x76c0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .boot0xf7c0000x5cec000x5cec00e1bdf37d5fc6bc13b12f5605567a7aecunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .reloc0x154b0000x10000x108fc964d0db62dc93f46c8deb7a3423e9False1.5GLS_BINARY_LSB_FIRST2.7743974703476995IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0x8082600x668Device independent bitmap graphic, 48 x 96 x 4, image size 0EnglishUnited States0.21890243902439024
          RT_ICON0x8088d80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.3400537634408602
          RT_ICON0x808bd00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 0EnglishUnited States0.35450819672131145
          RT_ICON0x808dc80x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.46283783783783783
          RT_ICON0x808f000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.5026652452025586
          RT_ICON0x809db80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.5798736462093863
          RT_ICON0x80a6700x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0EnglishUnited States0.40264976958525345
          RT_ICON0x80ad480x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.3273121387283237
          RT_ICON0x80b2c00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.27344398340248965
          RT_ICON0x80d8780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.37875234521575984
          RT_ICON0x80e9300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.37868852459016394
          RT_ICON0x80f2c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.4796099290780142
          RT_GROUP_ICON0x80f7400xaedataEnglishUnited States0.5977011494252874
          RT_VERSION0x80f8000x2d0data0.46944444444444444
          RT_MANIFEST0x80fae00x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
          DLLImport
          kernel32.dllGetModuleHandleA
          WS2_32.dllntohs
          PSAPI.DLLGetProcessMemoryInfo
          IPHLPAPI.DLLGetAdaptersAddresses
          USERENV.dllGetUserProfileDirectoryW
          CRYPT32.dllCertOpenStore
          USER32.dllGetProcessWindowStation
          SHELL32.dllSHGetSpecialFolderPathA
          ole32.dllCoInitializeEx
          ADVAPI32.dllGetUserNameW
          bcrypt.dllBCryptGenRandom
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
          2024-07-25T03:30:19.335638+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970852.165.165.26192.168.2.8
          2024-07-25T03:29:38.575377+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970540.127.169.103192.168.2.8
          2024-07-25T03:29:16.239082+0200TCP2826930ETPRO COINMINER XMR CoinMiner Usage4970780192.168.2.85.75.158.61
          TimestampSource PortDest PortSource IPDest IP
          Jul 25, 2024 03:29:49.605178118 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:29:49.610193014 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:29:49.610294104 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:29:49.610431910 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:29:49.616574049 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:29:50.300076962 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:29:50.379657984 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:30:40.097836971 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:30:40.103208065 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:30:40.325542927 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:30:40.535979033 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:30:47.116950035 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:30:47.121881962 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:30:47.343938112 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:30:47.535991907 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:30:53.487531900 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:30:53.536026955 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:30:57.426475048 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:30:57.431353092 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:30:57.653729916 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:30:57.832917929 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:03.871665001 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:03.876698971 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:04.098953009 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:04.332946062 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:06.748959064 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:06.832886934 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:13.581811905 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:13.587002993 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:15.937833071 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:16.036051035 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:16.277319908 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:16.332948923 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:18.279221058 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:18.285461903 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:18.507637978 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:18.723557949 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:25.918209076 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:25.923216105 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:26.150499105 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:26.223575115 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:27.081975937 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:27.086904049 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:27.310003996 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:27.536221981 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:36.015459061 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:36.020469904 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:36.243120909 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:36.332933903 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:43.031829119 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:31:43.078555107 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:43.522588968 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:31:43.723570108 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:32:06.736859083 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:32:06.833106041 CEST4970780192.168.2.85.75.158.61
          Jul 25, 2024 03:33:06.777941942 CEST80497075.75.158.61192.168.2.8
          Jul 25, 2024 03:33:06.833096027 CEST4970780192.168.2.85.75.158.61
          TimestampSource PortDest PortSource IPDest IP
          Jul 25, 2024 03:29:49.593398094 CEST6210053192.168.2.81.1.1.1
          Jul 25, 2024 03:29:49.602705956 CEST53621001.1.1.1192.168.2.8
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Jul 25, 2024 03:29:49.593398094 CEST192.168.2.81.1.1.10x588fStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Jul 25, 2024 03:29:49.602705956 CEST1.1.1.1192.168.2.80x588fNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
          Jul 25, 2024 03:29:49.602705956 CEST1.1.1.1192.168.2.80x588fNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.8497075.75.158.61807540C:\Users\user\Desktop\LisectAVT_2403002A_416.exe
          TimestampBytes transferredDirectionData
          Jul 25, 2024 03:29:49.610431910 CEST565OUTData Raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6c 6f 67 69 6e 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 6c 6f 67 69 6e 22 3a 22 38 42 66 78 69 52 50 59 31 67 71 32 6b 45 67 53 47 47 4c 31 75 51
          Data Ascii: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"8BfxiRPY1gq2kEgSGGL1uQNuoYGQBXTmT1eFb8vBV41bEoCCXXAafaoRQYtRXfpkozKnATgH8zv696gYpEhKdn2q8hEpiKw","pass":"myyerp","agent":"XMRig/6.19.2 (Windows NT 10.0; Win64; x64) libuv/1.31.0 msvc/
          Jul 25, 2024 03:29:50.300076962 CEST413INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 69 64 22 3a 31 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 69 64 22 3a 22 33 36 33 32 32 33 38 33 22 2c 22 6a 6f 62 22 3a 7b 22 62 6c 6f 62 22 3a 22 30 31 30 31
          Data Ascii: {"jsonrpc":"2.0","id":1,"error":null,"result":{"id":"36322383","job":{"blob":"0101d8d486b506c3ad3b8484121aff9b0ed6b1ba4bf76e0fe45dd95f8f4c47a8a2fe38bffd42e800000000fe4e55ec6b1bbe18f1da6052d3178deaaac498be1d666e2d27b8b9776889011b01","algo":"rx/
          Jul 25, 2024 03:30:40.097836971 CEST185OUTData Raw: 7b 22 69 64 22 3a 32 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 73 75 62 6d 69 74 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 33 36 33 32 32 33 38 33 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 33 36 33 32
          Data Ascii: {"id":2,"jsonrpc":"2.0","method":"submit","params":{"id":"36322383","job_id":"36322384","nonce":"91ab0000","result":"b52d6565d753c63e5f8ec8c4655c17ea8997adcead781277d580853b743e0200"}}
          Jul 25, 2024 03:30:40.325542927 CEST63INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 69 64 22 3a 32 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 73 74 61 74 75 73 22 3a 22 4f 4b 22 7d 7d 0a
          Data Ascii: {"jsonrpc":"2.0","id":2,"error":null,"result":{"status":"OK"}}
          Jul 25, 2024 03:30:47.116950035 CEST185OUTData Raw: 7b 22 69 64 22 3a 33 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 73 75 62 6d 69 74 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 33 36 33 32 32 33 38 33 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 33 36 33 32
          Data Ascii: {"id":3,"jsonrpc":"2.0","method":"submit","params":{"id":"36322383","job_id":"36322384","nonce":"08330000","result":"e1be701fc30309bf95823c4c65efdbfe25e9b48c19f38c1d363d0c3a4c870200"}}
          Jul 25, 2024 03:30:47.343938112 CEST63INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 69 64 22 3a 33 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 73 74 61 74 75 73 22 3a 22 4f 4b 22 7d 7d 0a
          Data Ascii: {"jsonrpc":"2.0","id":3,"error":null,"result":{"status":"OK"}}
          Jul 25, 2024 03:30:53.487531900 CEST370INData Raw: 7b 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 30 31 30 31 63 62 64 35 38 36 62 35 30 36 62 64 66 30 32 39 38 35 36 36 66 62 39 63 30 35 31 39 31 33 30 31 37 32 38 33 37 31 32 37 62 64 62 66
          Data Ascii: {"method":"job","params":{"blob":"0101cbd586b506bdf0298566fb9c0519130172837127bdbf1f9d66ca721a0b654565e29779b60c000000007502e1d847b0b1eb44b9289e05ba5e3cc0e83a42df01e80a69b722dae2a04f3101","algo":"rx/0","height":18006,"seed_hash":"761a858c346f1
          Jul 25, 2024 03:30:57.426475048 CEST185OUTData Raw: 7b 22 69 64 22 3a 34 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 73 75 62 6d 69 74 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 33 36 33 32 32 33 38 33 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 33 36 33 37
          Data Ascii: {"id":4,"jsonrpc":"2.0","method":"submit","params":{"id":"36322383","job_id":"36372967","nonce":"c5040000","result":"15008468f2b7396ed8ad7346be0206791dd4d15caa27dc7e9cc63dc9be0d0300"}}
          Jul 25, 2024 03:30:57.653729916 CEST63INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 69 64 22 3a 34 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 73 74 61 74 75 73 22 3a 22 4f 4b 22 7d 7d 0a
          Data Ascii: {"jsonrpc":"2.0","id":4,"error":null,"result":{"status":"OK"}}
          Jul 25, 2024 03:31:03.871665001 CEST185OUTData Raw: 7b 22 69 64 22 3a 35 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 73 75 62 6d 69 74 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 33 36 33 32 32 33 38 33 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 33 36 33 37
          Data Ascii: {"id":5,"jsonrpc":"2.0","method":"submit","params":{"id":"36322383","job_id":"36372967","nonce":"bb0d0000","result":"891c9d7c193c18fd41bcef547964ce9ded11df7201422a4d19c5be9b36c70e00"}}


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:21:29:19
          Start date:24/07/2024
          Path:C:\Users\user\Desktop\LisectAVT_2403002A_416.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_416.exe"
          Imagebase:0x140000000
          File size:8'455'189 bytes
          MD5 hash:A638C42D9952EB79DDA11C2895BB9E3D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000002.3847942578.00000000005A4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000000.00000003.1653229731.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:21:29:19
          Start date:24/07/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6ee680000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:6
          Start time:21:30:04
          Start date:24/07/2024
          Path:C:\Windows\System32\svchost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
          Imagebase:0x7ff67e6d0000
          File size:55'320 bytes
          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
          Has elevated privileges:true
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          No disassembly