Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 09:55
Behavioral task
behavioral1
Sample
06792dc561e6e09634eb31a013ab40a2.exe
Resource
win7-20231129-en
9 signatures
150 seconds
General
-
Target
06792dc561e6e09634eb31a013ab40a2.exe
-
Size
1.5MB
-
MD5
06792dc561e6e09634eb31a013ab40a2
-
SHA1
3914c5f7cbf36bef3249c3b66f1e4a3694a7f036
-
SHA256
1b6f3fa1c016ce89743cb0045de4046d96fad48792fe876fec95719cd9e2c4fa
-
SHA512
a5c629aebb9d5ca8669e3d58538635cd501f66b6aba786b5efbcbed9bcb2705cdfbccf769569f051d13fcd24456da98c7099143e225f31574cab0a8cb58d3318
-
SSDEEP
49152:SF8M6WvOv84a4uvt+2S8Cnjf9p91H0jR+pXEK:kOvqF+j8UjA+WK
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2872-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2872-16-0x0000000003440000-0x0000000003752000-memory.dmp xmrig behavioral1/memory/3060-27-0x0000000003220000-0x00000000033B3000-memory.dmp xmrig behavioral1/memory/3060-25-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/3060-36-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/3060-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2872-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3060 06792dc561e6e09634eb31a013ab40a2.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 06792dc561e6e09634eb31a013ab40a2.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 06792dc561e6e09634eb31a013ab40a2.exe -
resource yara_rule behavioral1/memory/2872-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/memory/3060-18-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2872 06792dc561e6e09634eb31a013ab40a2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2872 06792dc561e6e09634eb31a013ab40a2.exe 3060 06792dc561e6e09634eb31a013ab40a2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3060 2872 06792dc561e6e09634eb31a013ab40a2.exe 17 PID 2872 wrote to memory of 3060 2872 06792dc561e6e09634eb31a013ab40a2.exe 17 PID 2872 wrote to memory of 3060 2872 06792dc561e6e09634eb31a013ab40a2.exe 17 PID 2872 wrote to memory of 3060 2872 06792dc561e6e09634eb31a013ab40a2.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\06792dc561e6e09634eb31a013ab40a2.exeC:\Users\Admin\AppData\Local\Temp\06792dc561e6e09634eb31a013ab40a2.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3060
-
C:\Users\Admin\AppData\Local\Temp\06792dc561e6e09634eb31a013ab40a2.exe"C:\Users\Admin\AppData\Local\Temp\06792dc561e6e09634eb31a013ab40a2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2872