Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 12:00
Behavioral task
behavioral1
Sample
2704d66d460cf8aa3688381635dbb2c8.exe
Resource
win7-20231129-en
0 signatures
150 seconds
General
-
Target
2704d66d460cf8aa3688381635dbb2c8.exe
-
Size
784KB
-
MD5
2704d66d460cf8aa3688381635dbb2c8
-
SHA1
0eeef553165e2469e922363bf0d1660212743c04
-
SHA256
da69f1d28a96ab016f4063f3520f8931fd8a0dc6378988eab4934a595860f1f1
-
SHA512
4c4707bc45b04a8b14e1b7e3f5cd725b2c6c672afff2d99b36965f1e2b40f7bb50f9a1e986f27cc05237b974c0dfd37a5828bef5457bd74b4076a41f0ed500d6
-
SSDEEP
12288:Pfuvrt/7HtHBC3J82GsOYPGjotsfh8UGAH1fXWYCgvfjrB3ZDrYOTAkT9cqWTfYb:a/pU3jGcPyo1KH1PWJAjVJfYOH/zzT
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4304-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/740-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/740-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/740-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/740-20-0x00000000054A0000-0x0000000005633000-memory.dmp xmrig behavioral2/memory/4304-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 740 2704d66d460cf8aa3688381635dbb2c8.exe -
Executes dropped EXE 1 IoCs
pid Process 740 2704d66d460cf8aa3688381635dbb2c8.exe -
resource yara_rule behavioral2/memory/4304-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000c000000023174-11.dat upx behavioral2/memory/740-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4304 2704d66d460cf8aa3688381635dbb2c8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4304 2704d66d460cf8aa3688381635dbb2c8.exe 740 2704d66d460cf8aa3688381635dbb2c8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4304 wrote to memory of 740 4304 2704d66d460cf8aa3688381635dbb2c8.exe 20 PID 4304 wrote to memory of 740 4304 2704d66d460cf8aa3688381635dbb2c8.exe 20 PID 4304 wrote to memory of 740 4304 2704d66d460cf8aa3688381635dbb2c8.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\2704d66d460cf8aa3688381635dbb2c8.exe"C:\Users\Admin\AppData\Local\Temp\2704d66d460cf8aa3688381635dbb2c8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\2704d66d460cf8aa3688381635dbb2c8.exeC:\Users\Admin\AppData\Local\Temp\2704d66d460cf8aa3688381635dbb2c8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:740
-