Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 22:37
Behavioral task
behavioral1
Sample
8d883d66570955cc4b468022f5fc8a1a.exe
Resource
win7-20231215-en
General
-
Target
8d883d66570955cc4b468022f5fc8a1a.exe
-
Size
784KB
-
MD5
8d883d66570955cc4b468022f5fc8a1a
-
SHA1
b7363d584711da99f9346c17ae70db47d0ed766e
-
SHA256
e1fa0432dc09d323a3dd4a0ab0144afe4d0bc71db6cf729e3a228c078a375760
-
SHA512
0d175492544f34600f9f08691695728b4d078715e05adfea1680f3e8d8e18401cef8fb3f8e55391bb60b730d3d7a061914ab48d31a126eb2adf802d742e2f11f
-
SSDEEP
12288:8paLUt4OPIzFKaLFkGs/zFAJ/mvDotz57agfPJ61AsZfQgRm+RfcRSBD:7mIzFK4sFs/l1a+9s6g480R2D
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2156-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2156-15-0x0000000003100000-0x0000000003412000-memory.dmp xmrig behavioral1/memory/2156-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1888-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1888-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1888-26-0x0000000003150000-0x00000000032E3000-memory.dmp xmrig behavioral1/memory/1888-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1888 8d883d66570955cc4b468022f5fc8a1a.exe -
Executes dropped EXE 1 IoCs
pid Process 1888 8d883d66570955cc4b468022f5fc8a1a.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 8d883d66570955cc4b468022f5fc8a1a.exe -
resource yara_rule behavioral1/memory/2156-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000a000000012262-10.dat upx behavioral1/memory/2156-15-0x0000000003100000-0x0000000003412000-memory.dmp upx behavioral1/memory/1888-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2156 8d883d66570955cc4b468022f5fc8a1a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2156 8d883d66570955cc4b468022f5fc8a1a.exe 1888 8d883d66570955cc4b468022f5fc8a1a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1888 2156 8d883d66570955cc4b468022f5fc8a1a.exe 29 PID 2156 wrote to memory of 1888 2156 8d883d66570955cc4b468022f5fc8a1a.exe 29 PID 2156 wrote to memory of 1888 2156 8d883d66570955cc4b468022f5fc8a1a.exe 29 PID 2156 wrote to memory of 1888 2156 8d883d66570955cc4b468022f5fc8a1a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d883d66570955cc4b468022f5fc8a1a.exe"C:\Users\Admin\AppData\Local\Temp\8d883d66570955cc4b468022f5fc8a1a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\8d883d66570955cc4b468022f5fc8a1a.exeC:\Users\Admin\AppData\Local\Temp\8d883d66570955cc4b468022f5fc8a1a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1888
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD53dee562e6fe0cfb719356b5d0a7aa115
SHA1a028c15abd675b62b5cc00cc4fb361feeee3bef8
SHA256318dde790cdda6b8d6508b07af0526cb64cadf96bf2652c87a7536e4dd916227
SHA5127ff555fb5ee9f4abfa9c7646c307ba2519ab81e1806ffad194ea19e62b3e08c5081f071cd1af0f4b5ce8e0f5b077db1095edf9d6eaeab0214d59f7332cdaf304