Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 04:50
Behavioral task
behavioral1
Sample
67b29069068075b7818ec84bf5382e9f.exe
Resource
win7-20231215-en
General
-
Target
67b29069068075b7818ec84bf5382e9f.exe
-
Size
1.5MB
-
MD5
67b29069068075b7818ec84bf5382e9f
-
SHA1
c169882de30bc7e31a6b8c0454aa19eaa46ecf62
-
SHA256
091302a18e1bf85de2cdede03e15bb0c8f8ea01568a72745df2e0fabc5b74efd
-
SHA512
bad15bfef43137c2054c3407a488db890648e42406f70b28eb06886fcf62bc4e6e49270f86bfd893a18c899560663c04ec7a4861cc913d76cc1e655dd9505916
-
SSDEEP
24576:puoKwKdYObCAqkBktLtNsaFujWi+0YlfMg3xvWRUMn0Vj75CFtBrpBkS05i7XxVW:pujdYhmuWsHiHgdEKHMtrfd0k7XbWFt
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2296-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2296-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1952-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1952-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1952-25-0x00000000033D0000-0x0000000003563000-memory.dmp xmrig behavioral1/memory/1952-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1952-33-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1952 67b29069068075b7818ec84bf5382e9f.exe -
Executes dropped EXE 1 IoCs
pid Process 1952 67b29069068075b7818ec84bf5382e9f.exe -
Loads dropped DLL 1 IoCs
pid Process 2296 67b29069068075b7818ec84bf5382e9f.exe -
resource yara_rule behavioral1/memory/2296-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000a000000014439-10.dat upx behavioral1/files/0x000a000000014439-14.dat upx behavioral1/memory/1952-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2296 67b29069068075b7818ec84bf5382e9f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2296 67b29069068075b7818ec84bf5382e9f.exe 1952 67b29069068075b7818ec84bf5382e9f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1952 2296 67b29069068075b7818ec84bf5382e9f.exe 25 PID 2296 wrote to memory of 1952 2296 67b29069068075b7818ec84bf5382e9f.exe 25 PID 2296 wrote to memory of 1952 2296 67b29069068075b7818ec84bf5382e9f.exe 25 PID 2296 wrote to memory of 1952 2296 67b29069068075b7818ec84bf5382e9f.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\67b29069068075b7818ec84bf5382e9f.exe"C:\Users\Admin\AppData\Local\Temp\67b29069068075b7818ec84bf5382e9f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\67b29069068075b7818ec84bf5382e9f.exeC:\Users\Admin\AppData\Local\Temp\67b29069068075b7818ec84bf5382e9f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1952
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD519ca040b2f290a08f2f304d54caa7236
SHA1deb84806a9ecbe81399053aa906e4c993a44afb3
SHA2566484058660efd7643a76cc2466eb7ac70bb786df607406c69832c827bed02d04
SHA512772f3a9efbf47a35182551d59e8ef6eaef5b3786be9c52a5dfeaab18aebc1582c24ebb0785015b416033f0c71b1b9a6308180119778331183cea5f8f14881155
-
Filesize
310KB
MD5f407623fd3ba4249b2ff8afe8f96ba25
SHA1dd162df659265813a839ee084b7993dd3aea2ac6
SHA256f4dfaf16118b4d76e336f1a2b2e0f20d0640ba026d4293ebf7b4319727514ac2
SHA5124ace5baf878bf0995402cb1ad57145123cd9bae393149ff3081daaeebd9bc16a871d8fc8cb8992738fcb556d66dd1e593d66fb29095abc37f20510bbc5b0cd95