Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
926s -
max time network
1793s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/07/2023, 13:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
zx.exe
Resource
win7-20230712-en
8 signatures
1800 seconds
General
-
Target
zx.exe
-
Size
5.4MB
-
MD5
00ddee7f37fc5e215a882fc4087dbddc
-
SHA1
d037493f7241be289fe2bda32463fce91fe1b0ba
-
SHA256
ee29c2f2024806574391a1da48d9e38575cc93f9cbf57c9778e0e9bd7af5c45b
-
SHA512
ea8d2690bd262f7e31491851fad63f1df02e7c898d27b4b6cc17a91862b7209ad198c91793d30370c9a6f0d5c6c46105c4a2b43a9794091b9bff9f089fc48f2b
-
SSDEEP
98304:JSsnkpppRTS1x+fxxPC1NiUySli0QRG3GybVfxSM:J5nwpzgx+5s1MBYQY3Gyhfx
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1864 created 1244 1864 zx.exe 20 -
XMRig Miner payload 62 IoCs
resource yara_rule behavioral1/memory/1864-57-0x000000013F920000-0x000000013FE95000-memory.dmp xmrig behavioral1/memory/2648-61-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-64-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-65-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-66-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-67-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-68-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-69-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-75-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-76-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-77-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-78-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-79-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-80-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-81-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-82-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-83-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-84-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-85-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-86-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-87-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-88-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-89-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-90-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-91-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-92-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-93-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-94-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-95-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-96-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-97-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-98-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-99-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-100-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-101-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-102-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-103-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-104-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-105-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-106-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-107-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-108-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-109-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-110-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-111-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-112-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-113-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-114-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-115-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-116-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-117-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-118-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-119-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-120-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-121-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-122-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-123-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-124-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-125-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-126-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-127-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/2648-128-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1864 set thread context of 2648 1864 zx.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1864 zx.exe 1864 zx.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2648 explorer.exe Token: SeLockMemoryPrivilege 2648 explorer.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2648 1864 zx.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\zx.exe"C:\Users\Admin\AppData\Local\Temp\zx.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1864
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2648
-