Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 19:12
Behavioral task
behavioral1
Sample
5458035a39008a9151111797fb98eabd.exe
Resource
win7-20231129-en
General
-
Target
5458035a39008a9151111797fb98eabd.exe
-
Size
784KB
-
MD5
5458035a39008a9151111797fb98eabd
-
SHA1
3b71f4047b376c0d7448a36e2f83ee78d5aacf6b
-
SHA256
ba4569f3bccd7ccf61b913aaa5569892f9bd8e98a349a8b8603393ea841da8dc
-
SHA512
1810a6274472c15d3f1a4d9bd230a972fd052a7c47a5ad5331526c85f044a00726d1a11e4b85f4318cbf8f4426f361580e49bb4738b5a0275230eb19c6575c82
-
SSDEEP
12288:n1AloMXbMjso8ur6qIdX6e0l7Em2/yhgks5SmzDQjymHHAiF:nqeMwQqIdX6e0lGv2mz0jymn9F
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/2896-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2896-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4608-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4608-23-0x0000000005540000-0x00000000056D3000-memory.dmp xmrig behavioral2/memory/4608-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4608-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4608 5458035a39008a9151111797fb98eabd.exe -
Executes dropped EXE 1 IoCs
pid Process 4608 5458035a39008a9151111797fb98eabd.exe -
resource yara_rule behavioral2/memory/2896-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/4608-13-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023218-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2896 5458035a39008a9151111797fb98eabd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2896 5458035a39008a9151111797fb98eabd.exe 4608 5458035a39008a9151111797fb98eabd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4608 2896 5458035a39008a9151111797fb98eabd.exe 92 PID 2896 wrote to memory of 4608 2896 5458035a39008a9151111797fb98eabd.exe 92 PID 2896 wrote to memory of 4608 2896 5458035a39008a9151111797fb98eabd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5458035a39008a9151111797fb98eabd.exe"C:\Users\Admin\AppData\Local\Temp\5458035a39008a9151111797fb98eabd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\5458035a39008a9151111797fb98eabd.exeC:\Users\Admin\AppData\Local\Temp\5458035a39008a9151111797fb98eabd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5921625e9967144ab6702e6a8ae5abc4c
SHA1514e9ce55ee6868db62714690a29cac09bec5fb0
SHA256c3d6fd4fa73540e05e0d03a2dcaf4b7930629b1f6902a81aa3536e1badd399e4
SHA5126e29eaec9570522f73952d6c858031dc42c488425e92ec6b7a60798f488563c24551f84220ea04c9a89e6af5ea8a89602e9feca42ce9aa9fe6d1f7ebff02afde