Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 22:17
Behavioral task
behavioral1
Sample
7dffe0140722eb9e3e8b01321b371fbfc517199819bb674cb9b671bf18be36ae.exe
Resource
win7-20240221-en
General
-
Target
7dffe0140722eb9e3e8b01321b371fbfc517199819bb674cb9b671bf18be36ae.exe
-
Size
2.3MB
-
MD5
2cd6a3e3da46cee96a6d76fdb33de586
-
SHA1
aa832bc9a987d80b13c173f5fe46ef06a296161e
-
SHA256
7dffe0140722eb9e3e8b01321b371fbfc517199819bb674cb9b671bf18be36ae
-
SHA512
d628d37df8509c712eb408954a260a309f52d7fffb4319bcdc31858db796c0a2b245dcfcd46d7371596b3b6c3b444e108dc57bb81d65161584d3db47981850fa
-
SSDEEP
49152:BezaTF8FcNkNdfE0pZ9ozt4wIC5aIwC+ANXx7xLOp+19GV:BemTLkNdfE0pZrx
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 7 IoCs
resource yara_rule behavioral2/memory/3264-0-0x00007FF6A0DF0000-0x00007FF6A1144000-memory.dmp UPX behavioral2/files/0x0008000000023208-5.dat UPX behavioral2/files/0x000800000002320b-19.dat UPX behavioral2/memory/4940-38-0x00007FF60CCA0000-0x00007FF60CFF4000-memory.dmp UPX behavioral2/files/0x0007000000023212-49.dat UPX behavioral2/files/0x000700000002321e-99.dat UPX behavioral2/files/0x000700000002321c-157.dat UPX -
XMRig Miner payload 11 IoCs
resource yara_rule behavioral2/memory/3264-0-0x00007FF6A0DF0000-0x00007FF6A1144000-memory.dmp xmrig behavioral2/files/0x0008000000023208-5.dat xmrig behavioral2/files/0x000800000002320b-19.dat xmrig behavioral2/memory/4940-38-0x00007FF60CCA0000-0x00007FF60CFF4000-memory.dmp xmrig behavioral2/files/0x0007000000023212-49.dat xmrig behavioral2/files/0x000700000002321e-99.dat xmrig behavioral2/files/0x000700000002321c-157.dat xmrig behavioral2/memory/2996-241-0x00007FF6F8920000-0x00007FF6F8C74000-memory.dmp xmrig behavioral2/memory/2060-303-0x00007FF707150000-0x00007FF7074A4000-memory.dmp xmrig behavioral2/memory/2508-365-0x00007FF6ACBB0000-0x00007FF6ACF04000-memory.dmp xmrig behavioral2/memory/4928-468-0x00007FF76F0D0000-0x00007FF76F424000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/3264-0-0x00007FF6A0DF0000-0x00007FF6A1144000-memory.dmp upx behavioral2/files/0x0008000000023208-5.dat upx behavioral2/files/0x000800000002320b-19.dat upx behavioral2/memory/4940-38-0x00007FF60CCA0000-0x00007FF60CFF4000-memory.dmp upx behavioral2/files/0x0007000000023212-49.dat upx behavioral2/files/0x000700000002321e-99.dat upx behavioral2/files/0x000700000002321c-157.dat upx behavioral2/memory/2996-241-0x00007FF6F8920000-0x00007FF6F8C74000-memory.dmp upx behavioral2/memory/2060-303-0x00007FF707150000-0x00007FF7074A4000-memory.dmp upx behavioral2/memory/2508-365-0x00007FF6ACBB0000-0x00007FF6ACF04000-memory.dmp upx behavioral2/memory/4928-468-0x00007FF76F0D0000-0x00007FF76F424000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dffe0140722eb9e3e8b01321b371fbfc517199819bb674cb9b671bf18be36ae.exe"C:\Users\Admin\AppData\Local\Temp\7dffe0140722eb9e3e8b01321b371fbfc517199819bb674cb9b671bf18be36ae.exe"1⤵PID:3264
-
C:\Windows\System\edOXrGK.exeC:\Windows\System\edOXrGK.exe2⤵PID:232
-
-
C:\Windows\System\AnDDMTs.exeC:\Windows\System\AnDDMTs.exe2⤵PID:4940
-
-
C:\Windows\System\okAWmXl.exeC:\Windows\System\okAWmXl.exe2⤵PID:3920
-
-
C:\Windows\System\igNvETt.exeC:\Windows\System\igNvETt.exe2⤵PID:3812
-
-
C:\Windows\System\djhDbCJ.exeC:\Windows\System\djhDbCJ.exe2⤵PID:2996
-
-
C:\Windows\System\IRWpLxm.exeC:\Windows\System\IRWpLxm.exe2⤵PID:2832
-
-
C:\Windows\System\sTIFdkg.exeC:\Windows\System\sTIFdkg.exe2⤵PID:3204
-
-
C:\Windows\System\inBoMAk.exeC:\Windows\System\inBoMAk.exe2⤵PID:5192
-
-
C:\Windows\System\YobvkIi.exeC:\Windows\System\YobvkIi.exe2⤵PID:5396
-
-
C:\Windows\System\XoStUvF.exeC:\Windows\System\XoStUvF.exe2⤵PID:6188
-
-
C:\Windows\System\pqZuCHd.exeC:\Windows\System\pqZuCHd.exe2⤵PID:7008
-
-
C:\Windows\System\UBqoPWI.exeC:\Windows\System\UBqoPWI.exe2⤵PID:7224
-
-
C:\Windows\System\VIdhrnT.exeC:\Windows\System\VIdhrnT.exe2⤵PID:7240
-
-
C:\Windows\System\kQSMGVp.exeC:\Windows\System\kQSMGVp.exe2⤵PID:7264
-
-
C:\Windows\System\MVeYJuT.exeC:\Windows\System\MVeYJuT.exe2⤵PID:7280
-
-
C:\Windows\System\lucANGR.exeC:\Windows\System\lucANGR.exe2⤵PID:7304
-
-
C:\Windows\System\zQuigdc.exeC:\Windows\System\zQuigdc.exe2⤵PID:7320
-
-
C:\Windows\System\NLqUCzn.exeC:\Windows\System\NLqUCzn.exe2⤵PID:7336
-
-
C:\Windows\System\kiCMWfj.exeC:\Windows\System\kiCMWfj.exe2⤵PID:7360
-
-
C:\Windows\System\MSuacEB.exeC:\Windows\System\MSuacEB.exe2⤵PID:7376
-
-
C:\Windows\System\hETfesV.exeC:\Windows\System\hETfesV.exe2⤵PID:7400
-
-
C:\Windows\System\SsPRbEc.exeC:\Windows\System\SsPRbEc.exe2⤵PID:7416
-
-
C:\Windows\System\zuktrVO.exeC:\Windows\System\zuktrVO.exe2⤵PID:7440
-
-
C:\Windows\System\ONmxBjp.exeC:\Windows\System\ONmxBjp.exe2⤵PID:7460
-
-
C:\Windows\System\EMcJVDh.exeC:\Windows\System\EMcJVDh.exe2⤵PID:7476
-
-
C:\Windows\System\NJrROUT.exeC:\Windows\System\NJrROUT.exe2⤵PID:7496
-
-
C:\Windows\System\rNJPVQZ.exeC:\Windows\System\rNJPVQZ.exe2⤵PID:7512
-
-
C:\Windows\System\AEjbUFu.exeC:\Windows\System\AEjbUFu.exe2⤵PID:7536
-
-
C:\Windows\System\iDTOsuU.exeC:\Windows\System\iDTOsuU.exe2⤵PID:7556
-
-
C:\Windows\System\BORLTUv.exeC:\Windows\System\BORLTUv.exe2⤵PID:7588
-
-
C:\Windows\System\plWJxuX.exeC:\Windows\System\plWJxuX.exe2⤵PID:7608
-
-
C:\Windows\System\rvhVzSK.exeC:\Windows\System\rvhVzSK.exe2⤵PID:7624
-
-
C:\Windows\System\KDhzyGR.exeC:\Windows\System\KDhzyGR.exe2⤵PID:7648
-
-
C:\Windows\System\COESpCK.exeC:\Windows\System\COESpCK.exe2⤵PID:7664
-
-
C:\Windows\System\ghVizkb.exeC:\Windows\System\ghVizkb.exe2⤵PID:7684
-
-
C:\Windows\System\iSzAZPp.exeC:\Windows\System\iSzAZPp.exe2⤵PID:7708
-
-
C:\Windows\System\ijvATJt.exeC:\Windows\System\ijvATJt.exe2⤵PID:7724
-
-
C:\Windows\System\jttYqZP.exeC:\Windows\System\jttYqZP.exe2⤵PID:7748
-
-
C:\Windows\System\FsKpUBh.exeC:\Windows\System\FsKpUBh.exe2⤵PID:7764
-
-
C:\Windows\System\JUCCbYU.exeC:\Windows\System\JUCCbYU.exe2⤵PID:7784
-
-
C:\Windows\System\OUhuFTA.exeC:\Windows\System\OUhuFTA.exe2⤵PID:7804
-
-
C:\Windows\System\qttmxPq.exeC:\Windows\System\qttmxPq.exe2⤵PID:7820
-
-
C:\Windows\System\fvRPGKX.exeC:\Windows\System\fvRPGKX.exe2⤵PID:7844
-
-
C:\Windows\System\MmUXWfW.exeC:\Windows\System\MmUXWfW.exe2⤵PID:7860
-
-
C:\Windows\System\bAdFztt.exeC:\Windows\System\bAdFztt.exe2⤵PID:7876
-
-
C:\Windows\System\kRXabhq.exeC:\Windows\System\kRXabhq.exe2⤵PID:7904
-
-
C:\Windows\System\YoVGBaB.exeC:\Windows\System\YoVGBaB.exe2⤵PID:7928
-
-
C:\Windows\System\YDRwkJz.exeC:\Windows\System\YDRwkJz.exe2⤵PID:9076
-
-
C:\Windows\System\mLLBcsz.exeC:\Windows\System\mLLBcsz.exe2⤵PID:10836
-
-
C:\Windows\System\LhrbRZe.exeC:\Windows\System\LhrbRZe.exe2⤵PID:12104
-
-
C:\Windows\System\SgPaqEN.exeC:\Windows\System\SgPaqEN.exe2⤵PID:10552
-
-
C:\Windows\System\TkIhSCL.exeC:\Windows\System\TkIhSCL.exe2⤵PID:8864
-
-
C:\Windows\System\yZmeUGn.exeC:\Windows\System\yZmeUGn.exe2⤵PID:10120
-
-
C:\Windows\System\leeTAfJ.exeC:\Windows\System\leeTAfJ.exe2⤵PID:10360
-
-
C:\Windows\System\VROoVPX.exeC:\Windows\System\VROoVPX.exe2⤵PID:10832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD50642442db4acbbfb6037e06789624264
SHA1923aee440a6887c7a7a8a78085aa492b2cdcee65
SHA2565d6249e3d37c32c515e6f20e0771180c7b51c791102dfffe39e4510d623eda85
SHA5127fc8231c299b64743a966130c519362217b11d421c0ccc65ca7c97570221449b6e5bd90caefa97b416470db36fac07c3f48ea41836b395ab190e6121598e88a1
-
Filesize
256KB
MD5c852d0de044ecfdc8164664b8ea3dc6f
SHA1cfc38798bcbec8419f442fddcbe34cb37971445d
SHA25632715d7c1c8dcbb10f1add6b003e18def383412f1b6c48f4d9670b8e3ef1d0b7
SHA512e03bd3ea4470974d8087b8d17ce90233e5a96284236038a869c3b63a693e9a7c9719f6671b6b5d0dbeb167dd4786cd1b7a4b214b02967aac04fad66c8195132f
-
Filesize
128KB
MD57ce4ba1725e83a50f64ba525f8815dcf
SHA1b1714a2d23cfc42c18c37e1546ac0908d8252c04
SHA2569f7e171000696500dfb6a966f2c3ddf12dc1a77b8276ef660f14f7b7188d2908
SHA5122dff777f276295d96892e5749316e2e8892ba50f8398f9972ecc2f6e5378213e3cdd31c7c6ab8360d3490d1ec9e77be4e73ac137e108b2eddff2feaaf600be19
-
Filesize
1.4MB
MD58fb3698f8673ef06ea41ad75f61bfbd3
SHA1294f713cb64025f8a14dcfec332e5c5764b53dda
SHA25679da01e75d2ab0689c24a2f4ac62882b2c6ee3e4154c285d1a2380c3ce8d28a5
SHA512aa4bd78c7674da6a0771c09a8204c98c90304eac03b378ca8c34cda97562899160ede14984f764db94432737056c49c96e71380a9d090de1439cd8a58a6aa724
-
Filesize
64KB
MD551e4020b90426a266032ae5bcb74e5b3
SHA1242fa8dc7d05d7b78f629fe2652627274810a122
SHA2565984cb4794a67b4fd33c39a8582f294030d387db17fdb4933391142fb7f614c6
SHA5125acda5a7b0ce962164cbb0c2fe75fb43a2d35d269fbb33e0eda06f3daf5a3cc37b11c0b76c58b3b3846604a879813821c87b0ead541065090905bfc897125758