Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 03:15
Behavioral task
behavioral1
Sample
5983c4e38bb4987fea0d481a76ec5f50.exe
Resource
win7-20231215-en
General
-
Target
5983c4e38bb4987fea0d481a76ec5f50.exe
-
Size
784KB
-
MD5
5983c4e38bb4987fea0d481a76ec5f50
-
SHA1
4a7bbf2de2ae037081153349377191bd5912162f
-
SHA256
45f1a0fc4238292a75e0aca55b363e87868128e2316fc805c45ce2ddc91e9200
-
SHA512
068b28c4255728578dab0a96329d87adfc059cbeb87197b1742228ee59b8c0d2ff7d2fa7f2aea4a3f16bdc14bafc35c67815a1423966c95c35b6164d4c90c610
-
SSDEEP
24576:/4C/YiokSIwnVi1TTzy6KMj4p+0vpAoFD:/4MYiZXUVi1SFUIptF
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4620-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4620-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2164-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2164-20-0x00000000054E0000-0x0000000005673000-memory.dmp xmrig behavioral2/memory/2164-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2164-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2164 5983c4e38bb4987fea0d481a76ec5f50.exe -
Executes dropped EXE 1 IoCs
pid Process 2164 5983c4e38bb4987fea0d481a76ec5f50.exe -
resource yara_rule behavioral2/memory/4620-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0006000000023213-11.dat upx behavioral2/memory/2164-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4620 5983c4e38bb4987fea0d481a76ec5f50.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4620 5983c4e38bb4987fea0d481a76ec5f50.exe 2164 5983c4e38bb4987fea0d481a76ec5f50.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4620 wrote to memory of 2164 4620 5983c4e38bb4987fea0d481a76ec5f50.exe 91 PID 4620 wrote to memory of 2164 4620 5983c4e38bb4987fea0d481a76ec5f50.exe 91 PID 4620 wrote to memory of 2164 4620 5983c4e38bb4987fea0d481a76ec5f50.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5983c4e38bb4987fea0d481a76ec5f50.exe"C:\Users\Admin\AppData\Local\Temp\5983c4e38bb4987fea0d481a76ec5f50.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\5983c4e38bb4987fea0d481a76ec5f50.exeC:\Users\Admin\AppData\Local\Temp\5983c4e38bb4987fea0d481a76ec5f50.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2164
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
461KB
MD501fac1e7e95b396c6af4e1cd158caec4
SHA150d4a2ac7ab1e8577ec905fa6587853ddb8f221a
SHA256ce2881af5ca3ff9fd1ee086da7053c337ab83add49e5711eb81095068fcfb2b1
SHA51213b4cce6af0cb997028a313621c4cdb7076d8c4f229dde73e1ef396cb75efa20188663529174e38da68d38a1ae5462aaf649a18cadc802925999923707ba20cf