Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2023, 04:21

General

  • Target

    tmp.exe

  • Size

    5.2MB

  • MD5

    feadc2cb66640296a34b414114a76c23

  • SHA1

    fa88695d6fffd93fcdd14a2a3ae25fcde3a67942

  • SHA256

    fdbb6e0a160bc94da37c53e26298f29cce2b834f1e24a8ad3dd3f8f176823fc2

  • SHA512

    d53d923b8ea45d5b23a3c1318320bfc467531e00357baa7f6e1559c547415242aa4d100e36012f3aad098cf5a750af4db1fee01da73ae67413d2ef45b1345812

  • SSDEEP

    98304:6YA9ucCHqBvLYwZDgO0bLPrrIRff5eysAGGtzDWJJWAyFwkokfkjWl5auwKrjPff:6RCHqNMwEjAeJJxMokfkjWl5auwKrjPH

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 11 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in Drivers directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:2152
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1400
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Windows\System32\sc.exe
          sc stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:2776
        • C:\Windows\System32\sc.exe
          sc stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:2788
        • C:\Windows\System32\sc.exe
          sc stop wuauserv
          3⤵
          • Launches sc.exe
          PID:2816
        • C:\Windows\System32\sc.exe
          sc stop bits
          3⤵
          • Launches sc.exe
          PID:2780
        • C:\Windows\System32\sc.exe
          sc stop dosvc
          3⤵
          • Launches sc.exe
          PID:2064
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2148
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2544
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2692
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2660
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"
        2⤵
          PID:2840
        • C:\Windows\System32\schtasks.exe
          C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\ixagdlgsjvbo.xml"
          2⤵
          • Creates scheduled task(s)
          PID:2492
        • C:\Windows\System32\schtasks.exe
          C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
          2⤵
            PID:2576
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
            2⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1092
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2740
            • C:\Windows\System32\sc.exe
              sc stop UsoSvc
              3⤵
              • Launches sc.exe
              PID:2920
            • C:\Windows\System32\sc.exe
              sc stop WaaSMedicSvc
              3⤵
              • Launches sc.exe
              PID:2716
            • C:\Windows\System32\sc.exe
              sc stop wuauserv
              3⤵
              • Launches sc.exe
              PID:2708
            • C:\Windows\System32\sc.exe
              sc stop bits
              3⤵
              • Launches sc.exe
              PID:1876
            • C:\Windows\System32\sc.exe
              sc stop dosvc
              3⤵
              • Launches sc.exe
              PID:2932
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1636
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-ac 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2432
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1936
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-ac 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1960
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:268
          • C:\Windows\System32\schtasks.exe
            C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\ixagdlgsjvbo.xml"
            2⤵
            • Creates scheduled task(s)
            PID:2036
          • C:\Windows\System32\conhost.exe
            C:\Windows\System32\conhost.exe
            2⤵
              PID:1932
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2176
          • C:\Program Files\Google\Chrome\updater.exe
            "C:\Program Files\Google\Chrome\updater.exe"
            1⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2532

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Google\Chrome\updater.exe

            Filesize

            5.2MB

            MD5

            feadc2cb66640296a34b414114a76c23

            SHA1

            fa88695d6fffd93fcdd14a2a3ae25fcde3a67942

            SHA256

            fdbb6e0a160bc94da37c53e26298f29cce2b834f1e24a8ad3dd3f8f176823fc2

            SHA512

            d53d923b8ea45d5b23a3c1318320bfc467531e00357baa7f6e1559c547415242aa4d100e36012f3aad098cf5a750af4db1fee01da73ae67413d2ef45b1345812

          • C:\Program Files\Google\Chrome\updater.exe

            Filesize

            5.2MB

            MD5

            feadc2cb66640296a34b414114a76c23

            SHA1

            fa88695d6fffd93fcdd14a2a3ae25fcde3a67942

            SHA256

            fdbb6e0a160bc94da37c53e26298f29cce2b834f1e24a8ad3dd3f8f176823fc2

            SHA512

            d53d923b8ea45d5b23a3c1318320bfc467531e00357baa7f6e1559c547415242aa4d100e36012f3aad098cf5a750af4db1fee01da73ae67413d2ef45b1345812

          • C:\Users\Admin\AppData\Local\Temp\ixagdlgsjvbo.xml

            Filesize

            1KB

            MD5

            546d67a48ff2bf7682cea9fac07b942e

            SHA1

            a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90

            SHA256

            eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a

            SHA512

            10d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe

          • C:\Windows\System32\drivers\etc\hosts

            Filesize

            2KB

            MD5

            3e9af076957c5b2f9c9ce5ec994bea05

            SHA1

            a8c7326f6bceffaeed1c2bb8d7165e56497965fe

            SHA256

            e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e

            SHA512

            933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f

          • C:\Windows\TEMP\ixagdlgsjvbo.xml

            Filesize

            1KB

            MD5

            546d67a48ff2bf7682cea9fac07b942e

            SHA1

            a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90

            SHA256

            eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a

            SHA512

            10d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe

          • \Program Files\Google\Chrome\updater.exe

            Filesize

            5.2MB

            MD5

            feadc2cb66640296a34b414114a76c23

            SHA1

            fa88695d6fffd93fcdd14a2a3ae25fcde3a67942

            SHA256

            fdbb6e0a160bc94da37c53e26298f29cce2b834f1e24a8ad3dd3f8f176823fc2

            SHA512

            d53d923b8ea45d5b23a3c1318320bfc467531e00357baa7f6e1559c547415242aa4d100e36012f3aad098cf5a750af4db1fee01da73ae67413d2ef45b1345812

          • memory/1092-29-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

            Filesize

            9.6MB

          • memory/1092-23-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

            Filesize

            9.6MB

          • memory/1092-28-0x00000000012A0000-0x0000000001320000-memory.dmp

            Filesize

            512KB

          • memory/1092-27-0x00000000012A0000-0x0000000001320000-memory.dmp

            Filesize

            512KB

          • memory/1092-26-0x00000000012A0000-0x0000000001320000-memory.dmp

            Filesize

            512KB

          • memory/1092-25-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

            Filesize

            9.6MB

          • memory/1092-22-0x0000000000CF0000-0x0000000000CF8000-memory.dmp

            Filesize

            32KB

          • memory/1092-24-0x00000000012A0000-0x0000000001320000-memory.dmp

            Filesize

            512KB

          • memory/1092-21-0x0000000019B80000-0x0000000019E62000-memory.dmp

            Filesize

            2.9MB

          • memory/1400-5-0x000000001B280000-0x000000001B562000-memory.dmp

            Filesize

            2.9MB

          • memory/1400-7-0x0000000001F00000-0x0000000001F08000-memory.dmp

            Filesize

            32KB

          • memory/1400-9-0x0000000002600000-0x0000000002680000-memory.dmp

            Filesize

            512KB

          • memory/1400-8-0x0000000002600000-0x0000000002680000-memory.dmp

            Filesize

            512KB

          • memory/1400-11-0x0000000002600000-0x0000000002680000-memory.dmp

            Filesize

            512KB

          • memory/1400-10-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

            Filesize

            9.6MB

          • memory/1400-12-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

            Filesize

            9.6MB

          • memory/1400-6-0x000007FEF55C0000-0x000007FEF5F5D000-memory.dmp

            Filesize

            9.6MB

          • memory/1932-42-0x0000000140000000-0x0000000140013000-memory.dmp

            Filesize

            76KB

          • memory/2152-0-0x000000013FAD0000-0x0000000140013000-memory.dmp

            Filesize

            5.3MB

          • memory/2152-17-0x000000013FAD0000-0x0000000140013000-memory.dmp

            Filesize

            5.3MB

          • memory/2176-47-0x0000000140000000-0x0000000140840000-memory.dmp

            Filesize

            8.2MB

          • memory/2176-49-0x0000000140000000-0x0000000140840000-memory.dmp

            Filesize

            8.2MB

          • memory/2176-40-0x0000000000B70000-0x0000000000B90000-memory.dmp

            Filesize

            128KB

          • memory/2176-41-0x0000000000CE0000-0x0000000000D00000-memory.dmp

            Filesize

            128KB

          • memory/2176-65-0x0000000140000000-0x0000000140840000-memory.dmp

            Filesize

            8.2MB

          • memory/2176-43-0x0000000140000000-0x0000000140840000-memory.dmp

            Filesize

            8.2MB

          • memory/2176-44-0x0000000000B70000-0x0000000000B90000-memory.dmp

            Filesize

            128KB

          • memory/2176-45-0x0000000000CE0000-0x0000000000D00000-memory.dmp

            Filesize

            128KB

          • memory/2176-63-0x0000000140000000-0x0000000140840000-memory.dmp

            Filesize

            8.2MB

          • memory/2176-39-0x0000000000130000-0x0000000000150000-memory.dmp

            Filesize

            128KB

          • memory/2176-51-0x0000000140000000-0x0000000140840000-memory.dmp

            Filesize

            8.2MB

          • memory/2176-53-0x0000000140000000-0x0000000140840000-memory.dmp

            Filesize

            8.2MB

          • memory/2176-55-0x0000000140000000-0x0000000140840000-memory.dmp

            Filesize

            8.2MB

          • memory/2176-57-0x0000000140000000-0x0000000140840000-memory.dmp

            Filesize

            8.2MB

          • memory/2176-59-0x0000000140000000-0x0000000140840000-memory.dmp

            Filesize

            8.2MB

          • memory/2176-61-0x0000000140000000-0x0000000140840000-memory.dmp

            Filesize

            8.2MB

          • memory/2532-38-0x000000013FCD0000-0x0000000140213000-memory.dmp

            Filesize

            5.3MB

          • memory/2532-20-0x000000013FCD0000-0x0000000140213000-memory.dmp

            Filesize

            5.3MB