Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
03/12/2023, 04:27
General
-
Target
d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe
-
Size
1.2MB
-
MD5
ba30ecbbd32cbd96717cd1c7556d8a5b
-
SHA1
c6a0abe5f547383129058c847271019d31fec8b7
-
SHA256
d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e
-
SHA512
c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45
-
SSDEEP
24576:i2nhtFQReM4sclf0ILvRvhdKOPGnqEWMoBgRl0MZNNx:isGefsclL6OPGqJBgjlrN
Malware Config
Signatures
-
Detect PureLogs payload 4 IoCs
resource yara_rule behavioral1/memory/4248-0-0x000001CCCA6E0000-0x000001CCCA820000-memory.dmp family_purelogs behavioral1/files/0x000700000001ab93-21.dat family_purelogs behavioral1/files/0x000700000001ab93-22.dat family_purelogs behavioral1/files/0x000700000001ab93-26.dat family_purelogs -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1260-11-0x000002354D660000-0x000002354D760000-memory.dmp family_zgrat_v1 -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/4136-46-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4136-47-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4136-48-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4136-50-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4136-51-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4136-52-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4136-53-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4136-54-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4136-55-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4136-61-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4136-62-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4136-63-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig -
Executes dropped EXE 2 IoCs
pid Process 2892 TypeId.exe 916 TypeId.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4248 set thread context of 1260 4248 d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe 72 PID 2892 set thread context of 916 2892 TypeId.exe 74 PID 916 set thread context of 768 916 TypeId.exe 75 PID 768 set thread context of 3500 768 RegSvcs.exe 76 PID 3500 set thread context of 4136 3500 RegSvcs.exe 77 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4248 d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe 2892 TypeId.exe 768 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe 3500 RegSvcs.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4248 d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe Token: SeDebugPrivilege 1260 d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe Token: SeDebugPrivilege 2892 TypeId.exe Token: SeDebugPrivilege 916 TypeId.exe Token: SeDebugPrivilege 768 RegSvcs.exe Token: SeDebugPrivilege 3500 RegSvcs.exe Token: SeLockMemoryPrivilege 4136 AddInProcess.exe Token: SeLockMemoryPrivilege 4136 AddInProcess.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4136 AddInProcess.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4248 wrote to memory of 1260 4248 d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe 72 PID 4248 wrote to memory of 1260 4248 d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe 72 PID 4248 wrote to memory of 1260 4248 d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe 72 PID 4248 wrote to memory of 1260 4248 d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe 72 PID 4248 wrote to memory of 1260 4248 d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe 72 PID 4248 wrote to memory of 1260 4248 d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe 72 PID 2892 wrote to memory of 916 2892 TypeId.exe 74 PID 2892 wrote to memory of 916 2892 TypeId.exe 74 PID 2892 wrote to memory of 916 2892 TypeId.exe 74 PID 2892 wrote to memory of 916 2892 TypeId.exe 74 PID 2892 wrote to memory of 916 2892 TypeId.exe 74 PID 2892 wrote to memory of 916 2892 TypeId.exe 74 PID 916 wrote to memory of 768 916 TypeId.exe 75 PID 916 wrote to memory of 768 916 TypeId.exe 75 PID 916 wrote to memory of 768 916 TypeId.exe 75 PID 916 wrote to memory of 768 916 TypeId.exe 75 PID 916 wrote to memory of 768 916 TypeId.exe 75 PID 916 wrote to memory of 768 916 TypeId.exe 75 PID 768 wrote to memory of 3500 768 RegSvcs.exe 76 PID 768 wrote to memory of 3500 768 RegSvcs.exe 76 PID 768 wrote to memory of 3500 768 RegSvcs.exe 76 PID 768 wrote to memory of 3500 768 RegSvcs.exe 76 PID 768 wrote to memory of 3500 768 RegSvcs.exe 76 PID 768 wrote to memory of 3500 768 RegSvcs.exe 76 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 PID 3500 wrote to memory of 4136 3500 RegSvcs.exe 77 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe"C:\Users\Admin\AppData\Local\Temp\d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exeC:\Users\Admin\AppData\Local\Temp\d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exeC:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exeC:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 41ro9pm28wkFbbFCnmC78AfqpdFTw3fE56kajDNhw3naU9nXJQiqSvi7Vv71yAxLG3hXtP5Jne8utHn1oHsPXo1MQBhA5D6.miners -p x --algo rx/0 --cpu-max-threads-hint=505⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4136
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c59f53fdcc8060e77447ed9ebf9dc926
SHA10f1d44782f283b315a2ad6fe37727bdc188ea21c
SHA256cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d
SHA5121e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20
-
Filesize
1KB
MD5c59f53fdcc8060e77447ed9ebf9dc926
SHA10f1d44782f283b315a2ad6fe37727bdc188ea21c
SHA256cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d
SHA5121e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e.exe.log
Filesize1KB
MD5c59f53fdcc8060e77447ed9ebf9dc926
SHA10f1d44782f283b315a2ad6fe37727bdc188ea21c
SHA256cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d
SHA5121e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20
-
Filesize
1.2MB
MD5ba30ecbbd32cbd96717cd1c7556d8a5b
SHA1c6a0abe5f547383129058c847271019d31fec8b7
SHA256d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e
SHA512c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45
-
Filesize
1.2MB
MD5ba30ecbbd32cbd96717cd1c7556d8a5b
SHA1c6a0abe5f547383129058c847271019d31fec8b7
SHA256d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e
SHA512c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45
-
Filesize
1.2MB
MD5ba30ecbbd32cbd96717cd1c7556d8a5b
SHA1c6a0abe5f547383129058c847271019d31fec8b7
SHA256d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e
SHA512c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45