Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 04:36
Behavioral task
behavioral1
Sample
654d9e242c96ba63095c21dc6b6ceeb8.exe
Resource
win7-20231215-en
General
-
Target
654d9e242c96ba63095c21dc6b6ceeb8.exe
-
Size
784KB
-
MD5
654d9e242c96ba63095c21dc6b6ceeb8
-
SHA1
6731c50eebe766111c5de083c5abeb83612cf346
-
SHA256
bb7b43ee84e3cc6a207e29fe4b22f4f3e36279929d235686bc2ef478c3d11c69
-
SHA512
1a457e4e384d9de1960fe9071fef781124effb9e27d61a10b5a912f9cfa92a268af1178dd8f9a0bdd2a919ae2918c2d60f2d187973c82603c95034da29bf7122
-
SSDEEP
24576:rCnX2rlFDkBuwT1Wfhm1TceFXz12HeROh/:E2LQBuwopYceFJc8+
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/3696-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3696-13-0x0000000000400000-0x0000000000712000-memory.dmp xmrig behavioral2/memory/5000-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/5000-22-0x00000000052F0000-0x0000000005483000-memory.dmp xmrig behavioral2/memory/5000-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/5000-32-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/5000-31-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 5000 654d9e242c96ba63095c21dc6b6ceeb8.exe -
Executes dropped EXE 1 IoCs
pid Process 5000 654d9e242c96ba63095c21dc6b6ceeb8.exe -
resource yara_rule behavioral2/memory/3696-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0006000000023205-12.dat upx behavioral2/memory/5000-14-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3696 654d9e242c96ba63095c21dc6b6ceeb8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3696 654d9e242c96ba63095c21dc6b6ceeb8.exe 5000 654d9e242c96ba63095c21dc6b6ceeb8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3696 wrote to memory of 5000 3696 654d9e242c96ba63095c21dc6b6ceeb8.exe 92 PID 3696 wrote to memory of 5000 3696 654d9e242c96ba63095c21dc6b6ceeb8.exe 92 PID 3696 wrote to memory of 5000 3696 654d9e242c96ba63095c21dc6b6ceeb8.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\654d9e242c96ba63095c21dc6b6ceeb8.exe"C:\Users\Admin\AppData\Local\Temp\654d9e242c96ba63095c21dc6b6ceeb8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\654d9e242c96ba63095c21dc6b6ceeb8.exeC:\Users\Admin\AppData\Local\Temp\654d9e242c96ba63095c21dc6b6ceeb8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5000
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
618KB
MD54f3f2501b4982109816bc8d3f758ca5e
SHA15f95039b2b390e433574c89c8ab0def5b04ee4bb
SHA256f2d0f283670e93d750cf5a7c5809d6ae1455e0bead163ced7c4a4b1c74511f25
SHA512b29daf0f6fdd0fd15a9b536fc371ca4552a4cedae45ff2d3dcc477043fc7f7a226e144fe715d6827085a089d6c07b0c3157a187a0ad7781aceb92af4f9e37735