Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:55
Behavioral task
behavioral1
Sample
f99b190431ca87bf5736b3e0f8fcda49.exe
Resource
win7-20231215-en
General
-
Target
f99b190431ca87bf5736b3e0f8fcda49.exe
-
Size
784KB
-
MD5
f99b190431ca87bf5736b3e0f8fcda49
-
SHA1
f6389795b7d078f33f8e1c9439837a8795ae9b60
-
SHA256
9c1f0efd5f60c64c81983c8767211b29db775042f4d318d5f05deb88e36a7031
-
SHA512
634d2f4b815869e143b585746b23ee162d3c4fd0f1c0edd51c3180460cfe0a7a5aacb66275c787fc509d46139c03ef5145fcaaa61de1e8812035d5566e781045
-
SSDEEP
12288:oMBorBm/zmBfocJRuRdYuHT+QSEuWVkaNZHFonTmxCLUmyIPAWhdlFUecuTu2tdh:Byrw/qpPEuskQzmt3yVu7tAE
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/2636-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2636-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2768-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2768-25-0x0000000003220000-0x00000000033B3000-memory.dmp xmrig behavioral1/memory/2768-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2768-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2768 f99b190431ca87bf5736b3e0f8fcda49.exe -
Executes dropped EXE 1 IoCs
pid Process 2768 f99b190431ca87bf5736b3e0f8fcda49.exe -
Loads dropped DLL 1 IoCs
pid Process 2636 f99b190431ca87bf5736b3e0f8fcda49.exe -
resource yara_rule behavioral1/memory/2636-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000b000000012238-10.dat upx behavioral1/memory/2636-15-0x0000000003210000-0x0000000003522000-memory.dmp upx behavioral1/memory/2768-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2636 f99b190431ca87bf5736b3e0f8fcda49.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2636 f99b190431ca87bf5736b3e0f8fcda49.exe 2768 f99b190431ca87bf5736b3e0f8fcda49.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2768 2636 f99b190431ca87bf5736b3e0f8fcda49.exe 29 PID 2636 wrote to memory of 2768 2636 f99b190431ca87bf5736b3e0f8fcda49.exe 29 PID 2636 wrote to memory of 2768 2636 f99b190431ca87bf5736b3e0f8fcda49.exe 29 PID 2636 wrote to memory of 2768 2636 f99b190431ca87bf5736b3e0f8fcda49.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99b190431ca87bf5736b3e0f8fcda49.exe"C:\Users\Admin\AppData\Local\Temp\f99b190431ca87bf5736b3e0f8fcda49.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\f99b190431ca87bf5736b3e0f8fcda49.exeC:\Users\Admin\AppData\Local\Temp\f99b190431ca87bf5736b3e0f8fcda49.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2768
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5f837dad8d82754179ac4bf965a722367
SHA1aea58c1b49c9aa1c852333e5ae7e36cd571e2cce
SHA256cb1a2eab62c1e0986d6403bb50753d2472af59220be96868b302ca2cf73deb1e
SHA5121ccb79a46834d62d35a52ff5a019038f71cbc14af9ff966e448343e9ec3a36d642074bb4bc7d5394788c41fb8981cee4e08b804ee7500804bd45acdf898f62b2