Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:24
Behavioral task
behavioral1
Sample
ee49ec8d536af2cd14a5ac80543b3d44.exe
Resource
win7-20231129-en
9 signatures
150 seconds
General
-
Target
ee49ec8d536af2cd14a5ac80543b3d44.exe
-
Size
784KB
-
MD5
ee49ec8d536af2cd14a5ac80543b3d44
-
SHA1
626bb1f0c6fc29ccdfb3e16d6e6aa00d0111c051
-
SHA256
7da4edfa4ddd790670519141b490791fc1ffb1ab75696ef5cfc87d6c3b64b5b7
-
SHA512
38d958511a5803b50172c5d41e7fbeb6d92044ee651b6890b9b5ede9e88e62a5361edb0bf9d2ad91ea3cb23a847c4c9c06861e2e79fa87a7e56bdf45a99abcfd
-
SSDEEP
12288:dyoc80Q6qZdh7VXJjM1f72/CSX+RzSvlJL0YODDHvUcW9Zpx/YgIr:dO856q/XmFw5JQY+DLQDFR
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/3044-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3044-16-0x00000000030E0000-0x00000000033F2000-memory.dmp xmrig behavioral1/memory/3000-25-0x00000000030D0000-0x0000000003263000-memory.dmp xmrig behavioral1/memory/3000-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/3000-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/3000-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/3000-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3044-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3000 ee49ec8d536af2cd14a5ac80543b3d44.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 ee49ec8d536af2cd14a5ac80543b3d44.exe -
Loads dropped DLL 1 IoCs
pid Process 3044 ee49ec8d536af2cd14a5ac80543b3d44.exe -
resource yara_rule behavioral1/memory/3044-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/memory/3000-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3044 ee49ec8d536af2cd14a5ac80543b3d44.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3044 ee49ec8d536af2cd14a5ac80543b3d44.exe 3000 ee49ec8d536af2cd14a5ac80543b3d44.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3000 3044 ee49ec8d536af2cd14a5ac80543b3d44.exe 17 PID 3044 wrote to memory of 3000 3044 ee49ec8d536af2cd14a5ac80543b3d44.exe 17 PID 3044 wrote to memory of 3000 3044 ee49ec8d536af2cd14a5ac80543b3d44.exe 17 PID 3044 wrote to memory of 3000 3044 ee49ec8d536af2cd14a5ac80543b3d44.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee49ec8d536af2cd14a5ac80543b3d44.exe"C:\Users\Admin\AppData\Local\Temp\ee49ec8d536af2cd14a5ac80543b3d44.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\ee49ec8d536af2cd14a5ac80543b3d44.exeC:\Users\Admin\AppData\Local\Temp\ee49ec8d536af2cd14a5ac80543b3d44.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3000
-