Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 21:43
Behavioral task
behavioral1
Sample
473d85310f054f043f3741782550854d.exe
Resource
win7-20231215-en
General
-
Target
473d85310f054f043f3741782550854d.exe
-
Size
784KB
-
MD5
473d85310f054f043f3741782550854d
-
SHA1
218ff08e9efb31acedb70ff38b4a48d8a5b9c9f2
-
SHA256
dbc5f692d7af311deafaaf0b5dc07430d8eafa94f92cce9bc7514bc1fd5e8525
-
SHA512
84ffe7190eec79f1a161955f9084f6d10bc2c65dbccc035609909e32382411ecee8ddb0ff932e85c77db2c4df6af18975ca1d7c39b5ac436ed2c860c0e84c524
-
SSDEEP
24576:unH5xjnZoyrcm7a9FnX2Xrht6gR3BxKff6jd4:uZJnZoccm7aqXP6EYi4
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4844-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/972-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4844-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/972-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/972-21-0x00000000053B0000-0x0000000005543000-memory.dmp xmrig behavioral2/memory/972-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 972 473d85310f054f043f3741782550854d.exe -
Executes dropped EXE 1 IoCs
pid Process 972 473d85310f054f043f3741782550854d.exe -
resource yara_rule behavioral2/memory/4844-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000900000002304b-11.dat upx behavioral2/memory/972-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4844 473d85310f054f043f3741782550854d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4844 473d85310f054f043f3741782550854d.exe 972 473d85310f054f043f3741782550854d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4844 wrote to memory of 972 4844 473d85310f054f043f3741782550854d.exe 92 PID 4844 wrote to memory of 972 4844 473d85310f054f043f3741782550854d.exe 92 PID 4844 wrote to memory of 972 4844 473d85310f054f043f3741782550854d.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\473d85310f054f043f3741782550854d.exe"C:\Users\Admin\AppData\Local\Temp\473d85310f054f043f3741782550854d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\473d85310f054f043f3741782550854d.exeC:\Users\Admin\AppData\Local\Temp\473d85310f054f043f3741782550854d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5631a088ac19dad9f85437043876a1294
SHA1b1d530680a323d39c280c0cff87e3ede853b6dd7
SHA2566c355dbe91b4c450443a84e445b01bd186cec8ee1f5946624cdc09a2bc378c0c
SHA51253e58073da0b908941e9caae2b0a059a16c9fe4dae41ed0c0dfcc7dad6a7c237116d6eb014e760491c94bd297faff74158d5d82a9e0a58d5148ed8fd6e2d0264