Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 21:47
Behavioral task
behavioral1
Sample
51b441fc722169a556f963b3c6d4f3d1.exe
Resource
win7-20231129-en
General
-
Target
51b441fc722169a556f963b3c6d4f3d1.exe
-
Size
784KB
-
MD5
51b441fc722169a556f963b3c6d4f3d1
-
SHA1
18e1c4ca21e38955cfc5c62c826bd343933725ab
-
SHA256
552274ddbef1513b376901247c3ef7545ef64d3bdc14e8ad2ba4ea46c0ff4ed6
-
SHA512
5721b564c9dab19cef405c7da3621a53139459f40a80f38dcd1d1ffffd095891953824950c24b866d7d17310b3a1823bdf5f9200e9cfc777f2a762dda5d388a7
-
SSDEEP
24576:3ve2yrY5GSfeS3ZeMxdCn8Aob/Itksjxg:xyrYsS3ZeMxwntoLcjxg
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/1996-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1996-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2952-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2952-20-0x0000000005300000-0x0000000005493000-memory.dmp xmrig behavioral2/memory/2952-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2952-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2952-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2952 51b441fc722169a556f963b3c6d4f3d1.exe -
Executes dropped EXE 1 IoCs
pid Process 2952 51b441fc722169a556f963b3c6d4f3d1.exe -
resource yara_rule behavioral2/memory/1996-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000600000002320b-11.dat upx behavioral2/memory/2952-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1996 51b441fc722169a556f963b3c6d4f3d1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1996 51b441fc722169a556f963b3c6d4f3d1.exe 2952 51b441fc722169a556f963b3c6d4f3d1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2952 1996 51b441fc722169a556f963b3c6d4f3d1.exe 91 PID 1996 wrote to memory of 2952 1996 51b441fc722169a556f963b3c6d4f3d1.exe 91 PID 1996 wrote to memory of 2952 1996 51b441fc722169a556f963b3c6d4f3d1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\51b441fc722169a556f963b3c6d4f3d1.exe"C:\Users\Admin\AppData\Local\Temp\51b441fc722169a556f963b3c6d4f3d1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\51b441fc722169a556f963b3c6d4f3d1.exeC:\Users\Admin\AppData\Local\Temp\51b441fc722169a556f963b3c6d4f3d1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2952
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768KB
MD58650ebac70b34ef5fc874d8c84890fc7
SHA134f3c5277f5798b73ea26d8aae74e79cbc4ba92d
SHA2565e16e7cb3aea36d0a360e4f12497e47db8702af0c35e1fcbfd1d5c548184e8f7
SHA512acc5315a7cb693ad4110252c5765b7ada388cd74a8ce7b212b669256d08118e6083c190d6a6f05706d12f34e25649d7905b6f9588117df968821a25fff8f5eec