Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 09:12
Behavioral task
behavioral1
Sample
560d64dbfcf949fa9334589df3789e1c.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
560d64dbfcf949fa9334589df3789e1c.exe
-
Size
784KB
-
MD5
560d64dbfcf949fa9334589df3789e1c
-
SHA1
9f2750c376ea84c4f5fa50e045132b535c989f46
-
SHA256
7310ea35ef4cb98e6d442e4ac47b4f4a562dec6c170fd0568ac68469be011607
-
SHA512
503de701937414ab89a1982b2eec3aa661d521e90d4b9d6466eceb91675ded0ba71425d2c4ade0a370959bcdcb7fe7db0930904b7c97c22f4494450f1d305191
-
SSDEEP
12288:0sBKgpWfsnTs2r1jDgZgjD/8RR9ElyeeM8YC+v7Y7FAZiVJXXhzq34t:zBVqsnAw1/fH8BAyLAjYTls
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3952-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3952-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1808-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1808-20-0x00000000054D0000-0x0000000005663000-memory.dmp xmrig behavioral2/memory/1808-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1808-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1808 560d64dbfcf949fa9334589df3789e1c.exe -
Executes dropped EXE 1 IoCs
pid Process 1808 560d64dbfcf949fa9334589df3789e1c.exe -
resource yara_rule behavioral2/memory/3952-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/1808-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3952 560d64dbfcf949fa9334589df3789e1c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3952 560d64dbfcf949fa9334589df3789e1c.exe 1808 560d64dbfcf949fa9334589df3789e1c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3952 wrote to memory of 1808 3952 560d64dbfcf949fa9334589df3789e1c.exe 27 PID 3952 wrote to memory of 1808 3952 560d64dbfcf949fa9334589df3789e1c.exe 27 PID 3952 wrote to memory of 1808 3952 560d64dbfcf949fa9334589df3789e1c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\560d64dbfcf949fa9334589df3789e1c.exe"C:\Users\Admin\AppData\Local\Temp\560d64dbfcf949fa9334589df3789e1c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\560d64dbfcf949fa9334589df3789e1c.exeC:\Users\Admin\AppData\Local\Temp\560d64dbfcf949fa9334589df3789e1c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1808
-