Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:32
Behavioral task
behavioral1
Sample
3828a5ad4542092befc84fdee1586f7c.exe
Resource
win7-20231215-en
General
-
Target
3828a5ad4542092befc84fdee1586f7c.exe
-
Size
1.5MB
-
MD5
3828a5ad4542092befc84fdee1586f7c
-
SHA1
f3c892f174e4a7ba37cc4e9fe73103e24029b0db
-
SHA256
bccb727cc1ccbdfbc3b8a1d8a63409381238db23f27a763f7edfcf213e2421ab
-
SHA512
1e875d5e3d740c414595f4676514dfdd70c887093f5bc884b3b99921046fc3105735691092cb2adf3fac4f1a3a6f60c32fddac5ab3767721ee4ffc8b29e50522
-
SSDEEP
49152:8D9F7lTrj2Lq9jOtd1iJR1AfPuNOeu1M:8DZD2rti+fPuNOV1M
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/548-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/548-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2044-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2044-21-0x0000000005570000-0x0000000005703000-memory.dmp xmrig behavioral2/memory/2044-22-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2044-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2044 3828a5ad4542092befc84fdee1586f7c.exe -
Executes dropped EXE 1 IoCs
pid Process 2044 3828a5ad4542092befc84fdee1586f7c.exe -
resource yara_rule behavioral2/memory/548-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/2044-14-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0006000000023211-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 548 3828a5ad4542092befc84fdee1586f7c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 548 3828a5ad4542092befc84fdee1586f7c.exe 2044 3828a5ad4542092befc84fdee1586f7c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 548 wrote to memory of 2044 548 3828a5ad4542092befc84fdee1586f7c.exe 39 PID 548 wrote to memory of 2044 548 3828a5ad4542092befc84fdee1586f7c.exe 39 PID 548 wrote to memory of 2044 548 3828a5ad4542092befc84fdee1586f7c.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\3828a5ad4542092befc84fdee1586f7c.exe"C:\Users\Admin\AppData\Local\Temp\3828a5ad4542092befc84fdee1586f7c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\3828a5ad4542092befc84fdee1586f7c.exeC:\Users\Admin\AppData\Local\Temp\3828a5ad4542092befc84fdee1586f7c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5c298d207a2ef8b09d797419618802119
SHA11c544132dfa33928445a61d9b78f153ac20b4a41
SHA256685b6f77f5a43487dcfaf790c8617c77b368c373887d2d53b81877c49914ea13
SHA512be0a698c5508a0a5dc0b213a42cf2d7c03c6ec5e8be6d1d3320ea25c669073b6f12fff54630d0a62aec5733c16d917dd8c9c863f2b7830e1797f57e385115b63