Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/09/2022, 13:57

General

  • Target

    2561b5c0b97704fa5206d7000a1018f5924397036b82d08f056f7521c80d34e4.exe

  • Size

    400KB

  • MD5

    c7bcb15956d864e39039d3613316c675

  • SHA1

    d7f1399f4abf230ffb02427585d6f306b9d6843d

  • SHA256

    2561b5c0b97704fa5206d7000a1018f5924397036b82d08f056f7521c80d34e4

  • SHA512

    69340e4c0bdc6f7fd329923453d4ba0958ec64a60374f4245010b95665bc028239129b5782e5e574466c8d7ad7d96b653f2193f814e1de0e7e411a95f5426b6d

  • SSDEEP

    12288:CHJfYhK0bUticPtFZboqWIN+hKyDvp7fcMFEWBmcFgzU:CJWu+pFEs/FKU

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 54 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2561b5c0b97704fa5206d7000a1018f5924397036b82d08f056f7521c80d34e4.exe
    "C:\Users\Admin\AppData\Local\Temp\2561b5c0b97704fa5206d7000a1018f5924397036b82d08f056f7521c80d34e4.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\system32\cmdl32.exe
      "C:\Windows\system32\cmdl32.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4980
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2388
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3420
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4308

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4308-139-0x0000014D7A050000-0x0000014D7A058000-memory.dmp

    Filesize

    32KB

  • memory/4308-140-0x0000014D7AD00000-0x0000014D7AD20000-memory.dmp

    Filesize

    128KB

  • memory/4308-142-0x0000014D7AAC0000-0x0000014D7AAE0000-memory.dmp

    Filesize

    128KB

  • memory/4308-148-0x000001450000E000-0x0000014500012000-memory.dmp

    Filesize

    16KB

  • memory/4308-149-0x000001450000E000-0x0000014500012000-memory.dmp

    Filesize

    16KB

  • memory/4308-150-0x000001450000E000-0x0000014500012000-memory.dmp

    Filesize

    16KB

  • memory/4308-152-0x000001450000E000-0x0000014500012000-memory.dmp

    Filesize

    16KB

  • memory/4308-151-0x000001450000E000-0x0000014500012000-memory.dmp

    Filesize

    16KB

  • memory/4308-154-0x0000014D79000000-0x0000014D79100000-memory.dmp

    Filesize

    1024KB

  • memory/4308-164-0x000001450003A000-0x000001450003D000-memory.dmp

    Filesize

    12KB

  • memory/4308-163-0x000001450003A000-0x000001450003D000-memory.dmp

    Filesize

    12KB

  • memory/4308-162-0x000001450003A000-0x000001450003D000-memory.dmp

    Filesize

    12KB

  • memory/4308-161-0x000001450003A000-0x000001450003D000-memory.dmp

    Filesize

    12KB

  • memory/4308-159-0x000001450002F000-0x0000014500033000-memory.dmp

    Filesize

    16KB

  • memory/4308-158-0x000001450002F000-0x0000014500033000-memory.dmp

    Filesize

    16KB

  • memory/4308-157-0x000001450002F000-0x0000014500033000-memory.dmp

    Filesize

    16KB

  • memory/4308-156-0x000001450002F000-0x0000014500033000-memory.dmp

    Filesize

    16KB

  • memory/4980-166-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-167-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-168-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-169-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-170-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-171-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-172-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-173-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-174-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-175-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-176-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-178-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-180-0x0000000140000000-0x0000000140728000-memory.dmp

    Filesize

    7.2MB

  • memory/4980-181-0x0000021B12450000-0x0000021B12470000-memory.dmp

    Filesize

    128KB

  • memory/4980-182-0x0000021BA5F70000-0x0000021BA5FB0000-memory.dmp

    Filesize

    256KB

  • memory/4980-183-0x0000021B13E20000-0x0000021B13E40000-memory.dmp

    Filesize

    128KB

  • memory/4980-184-0x0000021B13E20000-0x0000021B13E40000-memory.dmp

    Filesize

    128KB