Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 15:42
Behavioral task
behavioral1
Sample
de2687368c14254727464b0fa84648f9.exe
Resource
win7-20231215-en
General
-
Target
de2687368c14254727464b0fa84648f9.exe
-
Size
1.5MB
-
MD5
de2687368c14254727464b0fa84648f9
-
SHA1
12835354b73858e92f309950107a17a1f89ff8ea
-
SHA256
77e317f36cb588c2ec059710a614815e93f84a5a037b6e998bd214439aba7226
-
SHA512
999bf21dd83898477fd22b146921257eb2e9c1a23a8c01906c4327ce1433cdf63b83978bda16d98e850da6d38c8ef4dabbdfa75a65d02ba5ffccb680fac87e10
-
SSDEEP
24576:mReN9gtDypal+znTA4dVNVtiCcj5l6mpUCcbjRyeTF87XC/odG1q3YEAPZ0jm:+Wpal+XpZiCVYUC2rTF875G1E8O
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/1104-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1104-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2060-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2060-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2060-26-0x0000000003290000-0x0000000003423000-memory.dmp xmrig behavioral1/memory/2060-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2060 de2687368c14254727464b0fa84648f9.exe -
Executes dropped EXE 1 IoCs
pid Process 2060 de2687368c14254727464b0fa84648f9.exe -
Loads dropped DLL 1 IoCs
pid Process 1104 de2687368c14254727464b0fa84648f9.exe -
resource yara_rule behavioral1/memory/1104-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000a000000012243-10.dat upx behavioral1/memory/1104-15-0x0000000003390000-0x00000000036A2000-memory.dmp upx behavioral1/memory/2060-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1104 de2687368c14254727464b0fa84648f9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1104 de2687368c14254727464b0fa84648f9.exe 2060 de2687368c14254727464b0fa84648f9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2060 1104 de2687368c14254727464b0fa84648f9.exe 29 PID 1104 wrote to memory of 2060 1104 de2687368c14254727464b0fa84648f9.exe 29 PID 1104 wrote to memory of 2060 1104 de2687368c14254727464b0fa84648f9.exe 29 PID 1104 wrote to memory of 2060 1104 de2687368c14254727464b0fa84648f9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\de2687368c14254727464b0fa84648f9.exe"C:\Users\Admin\AppData\Local\Temp\de2687368c14254727464b0fa84648f9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\de2687368c14254727464b0fa84648f9.exeC:\Users\Admin\AppData\Local\Temp\de2687368c14254727464b0fa84648f9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2060
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD54266118d54a3552be864227c26666ee5
SHA123ec6fae9a1313c96eba56257168d833847b101d
SHA256a4a766d0d874bd8113851c822a40ab35209c8c7c13ae6001a7b3e3344303af27
SHA5124329a91fb0891da253f5d68c91558c5722c1ee03d3fb4bc2d820a32e5a08340a0fc302a25c4ca82a7bc2d0e25431546d40dfb7a45b38523910e56436dfd4780d