Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 15:42
Behavioral task
behavioral1
Sample
de2687368c14254727464b0fa84648f9.exe
Resource
win7-20231215-en
General
-
Target
de2687368c14254727464b0fa84648f9.exe
-
Size
1.5MB
-
MD5
de2687368c14254727464b0fa84648f9
-
SHA1
12835354b73858e92f309950107a17a1f89ff8ea
-
SHA256
77e317f36cb588c2ec059710a614815e93f84a5a037b6e998bd214439aba7226
-
SHA512
999bf21dd83898477fd22b146921257eb2e9c1a23a8c01906c4327ce1433cdf63b83978bda16d98e850da6d38c8ef4dabbdfa75a65d02ba5ffccb680fac87e10
-
SSDEEP
24576:mReN9gtDypal+znTA4dVNVtiCcj5l6mpUCcbjRyeTF87XC/odG1q3YEAPZ0jm:+Wpal+XpZiCVYUC2rTF875G1E8O
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/2988-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2988-11-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/512-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/512-20-0x0000000005300000-0x0000000005493000-memory.dmp xmrig behavioral2/memory/512-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/512-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/512-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 512 de2687368c14254727464b0fa84648f9.exe -
Executes dropped EXE 1 IoCs
pid Process 512 de2687368c14254727464b0fa84648f9.exe -
resource yara_rule behavioral2/memory/2988-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000600000002322b-12.dat upx behavioral2/memory/512-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2988 de2687368c14254727464b0fa84648f9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2988 de2687368c14254727464b0fa84648f9.exe 512 de2687368c14254727464b0fa84648f9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 512 2988 de2687368c14254727464b0fa84648f9.exe 94 PID 2988 wrote to memory of 512 2988 de2687368c14254727464b0fa84648f9.exe 94 PID 2988 wrote to memory of 512 2988 de2687368c14254727464b0fa84648f9.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\de2687368c14254727464b0fa84648f9.exe"C:\Users\Admin\AppData\Local\Temp\de2687368c14254727464b0fa84648f9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\de2687368c14254727464b0fa84648f9.exeC:\Users\Admin\AppData\Local\Temp\de2687368c14254727464b0fa84648f9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:512
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD50962b435a2ea5783de7d8b51438a56a6
SHA135521c7a5ac190e37c0b46417fd80c7227c6756f
SHA2563c7c35718db8b29a285a6ad55309acb6ee0a68da813b50af52ce2ac9602f5925
SHA51271194bc3aa6727901c34ef9640b8ade617f96e36d6eae0644829f3098569c287f0f3da41d16779321c07126e71851f37a427aca8a2ea85e5853809f7838c2980