Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    23s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 23:16

General

  • Target

    be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe

  • Size

    2.2MB

  • MD5

    145885152996bd9f1bfc163a316e0aa3

  • SHA1

    f698d078213ee9adb3611f764aae78d9845f67a8

  • SHA256

    be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3

  • SHA512

    2c31b4eb6caf092b7b92df4192838db4ae9a0c4f028e56d14f5f6a6c3fc4a0629461aa6d553978d35aeaf9b76a060fbe8040940d92898b3477c165ff1d9d0111

  • SSDEEP

    49152:BezaTF8FcNkNdfE0pZ9ozt4wICbbnlD52UUrcl:BemTLkNdfE0pZrS

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • UPX dump on OEP (original entry point) 15 IoCs
  • XMRig Miner payload 25 IoCs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe
    "C:\Users\Admin\AppData\Local\Temp\be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4692
    • C:\Windows\System\vVcUUUM.exe
      C:\Windows\System\vVcUUUM.exe
      2⤵
      • Executes dropped EXE
      PID:3780
    • C:\Windows\System\NtqPSgm.exe
      C:\Windows\System\NtqPSgm.exe
      2⤵
        PID:224
      • C:\Windows\System\XCxFFTM.exe
        C:\Windows\System\XCxFFTM.exe
        2⤵
        • Executes dropped EXE
        PID:3532
      • C:\Windows\System\vDSCseZ.exe
        C:\Windows\System\vDSCseZ.exe
        2⤵
          PID:4596
        • C:\Windows\System\FzNwJCR.exe
          C:\Windows\System\FzNwJCR.exe
          2⤵
          • Executes dropped EXE
          PID:2708
        • C:\Windows\System\zITGLcg.exe
          C:\Windows\System\zITGLcg.exe
          2⤵
            PID:3684
          • C:\Windows\System\GLilzyI.exe
            C:\Windows\System\GLilzyI.exe
            2⤵
              PID:1472
            • C:\Windows\System\jMUuhSx.exe
              C:\Windows\System\jMUuhSx.exe
              2⤵
                PID:1820
              • C:\Windows\System\ZggyLqN.exe
                C:\Windows\System\ZggyLqN.exe
                2⤵
                  PID:1016
                • C:\Windows\System\DTjyNNi.exe
                  C:\Windows\System\DTjyNNi.exe
                  2⤵
                    PID:4968
                  • C:\Windows\System\hUuhnId.exe
                    C:\Windows\System\hUuhnId.exe
                    2⤵
                      PID:228
                    • C:\Windows\System\WeoFLof.exe
                      C:\Windows\System\WeoFLof.exe
                      2⤵
                        PID:3964
                      • C:\Windows\System\zzxDxjb.exe
                        C:\Windows\System\zzxDxjb.exe
                        2⤵
                          PID:4204
                        • C:\Windows\System\KrZxUWv.exe
                          C:\Windows\System\KrZxUWv.exe
                          2⤵
                            PID:3536
                          • C:\Windows\System\xpzbySt.exe
                            C:\Windows\System\xpzbySt.exe
                            2⤵
                              PID:4600
                            • C:\Windows\System\PqGCUtK.exe
                              C:\Windows\System\PqGCUtK.exe
                              2⤵
                                PID:3636
                              • C:\Windows\System\ZvwhjAq.exe
                                C:\Windows\System\ZvwhjAq.exe
                                2⤵
                                  PID:2848
                                • C:\Windows\System\sohGfdw.exe
                                  C:\Windows\System\sohGfdw.exe
                                  2⤵
                                    PID:3564
                                  • C:\Windows\System\jtvZDzT.exe
                                    C:\Windows\System\jtvZDzT.exe
                                    2⤵
                                      PID:848
                                    • C:\Windows\System\HnxTsEV.exe
                                      C:\Windows\System\HnxTsEV.exe
                                      2⤵
                                        PID:2816
                                      • C:\Windows\System\qBRmrUh.exe
                                        C:\Windows\System\qBRmrUh.exe
                                        2⤵
                                          PID:4884
                                        • C:\Windows\System\AxIhUkb.exe
                                          C:\Windows\System\AxIhUkb.exe
                                          2⤵
                                            PID:3548
                                          • C:\Windows\System\OHgUkGf.exe
                                            C:\Windows\System\OHgUkGf.exe
                                            2⤵
                                              PID:4880
                                            • C:\Windows\System\mDKMhoW.exe
                                              C:\Windows\System\mDKMhoW.exe
                                              2⤵
                                                PID:4460
                                              • C:\Windows\System\eNJMPai.exe
                                                C:\Windows\System\eNJMPai.exe
                                                2⤵
                                                  PID:332
                                                • C:\Windows\System\vKJAdlr.exe
                                                  C:\Windows\System\vKJAdlr.exe
                                                  2⤵
                                                    PID:3584
                                                  • C:\Windows\System\ZBIZdBK.exe
                                                    C:\Windows\System\ZBIZdBK.exe
                                                    2⤵
                                                      PID:4012
                                                    • C:\Windows\System\zUnxfIP.exe
                                                      C:\Windows\System\zUnxfIP.exe
                                                      2⤵
                                                        PID:3368
                                                      • C:\Windows\System\jsbZWHn.exe
                                                        C:\Windows\System\jsbZWHn.exe
                                                        2⤵
                                                          PID:1332
                                                        • C:\Windows\System\WrtnBcP.exe
                                                          C:\Windows\System\WrtnBcP.exe
                                                          2⤵
                                                            PID:2568
                                                          • C:\Windows\System\SUCMNjC.exe
                                                            C:\Windows\System\SUCMNjC.exe
                                                            2⤵
                                                              PID:1456
                                                            • C:\Windows\System\qoMbVog.exe
                                                              C:\Windows\System\qoMbVog.exe
                                                              2⤵
                                                                PID:3016
                                                              • C:\Windows\System\wkuNkFv.exe
                                                                C:\Windows\System\wkuNkFv.exe
                                                                2⤵
                                                                  PID:2984
                                                                • C:\Windows\System\BgUapcn.exe
                                                                  C:\Windows\System\BgUapcn.exe
                                                                  2⤵
                                                                    PID:4644
                                                                  • C:\Windows\System\nKISjZF.exe
                                                                    C:\Windows\System\nKISjZF.exe
                                                                    2⤵
                                                                      PID:2440
                                                                    • C:\Windows\System\WWArMdc.exe
                                                                      C:\Windows\System\WWArMdc.exe
                                                                      2⤵
                                                                        PID:4404
                                                                      • C:\Windows\System\rajJohd.exe
                                                                        C:\Windows\System\rajJohd.exe
                                                                        2⤵
                                                                          PID:4952
                                                                        • C:\Windows\System\YrpBtDc.exe
                                                                          C:\Windows\System\YrpBtDc.exe
                                                                          2⤵
                                                                            PID:5104
                                                                          • C:\Windows\System\uGwjwJB.exe
                                                                            C:\Windows\System\uGwjwJB.exe
                                                                            2⤵
                                                                              PID:6976
                                                                            • C:\Windows\System\RpXIWsO.exe
                                                                              C:\Windows\System\RpXIWsO.exe
                                                                              2⤵
                                                                                PID:6600
                                                                              • C:\Windows\System\eUEuoVa.exe
                                                                                C:\Windows\System\eUEuoVa.exe
                                                                                2⤵
                                                                                  PID:6732
                                                                                • C:\Windows\System\hMmqZkL.exe
                                                                                  C:\Windows\System\hMmqZkL.exe
                                                                                  2⤵
                                                                                    PID:7328
                                                                                  • C:\Windows\System\EJtBOBI.exe
                                                                                    C:\Windows\System\EJtBOBI.exe
                                                                                    2⤵
                                                                                      PID:11200
                                                                                    • C:\Windows\System\JpQOjaJ.exe
                                                                                      C:\Windows\System\JpQOjaJ.exe
                                                                                      2⤵
                                                                                        PID:9008

                                                                                    Network

                                                                                    MITRE ATT&CK Matrix

                                                                                    Replay Monitor

                                                                                    Loading Replay Monitor...

                                                                                    Downloads

                                                                                    • C:\Windows\System\NtqPSgm.exe

                                                                                      Filesize

                                                                                      1.4MB

                                                                                      MD5

                                                                                      2a352a5dac956a426621d06c163a834e

                                                                                      SHA1

                                                                                      223f1e7ce63e127643b8e64e7a3d2a72ba570c04

                                                                                      SHA256

                                                                                      9bf1caaff1c9eb8396e7658597d561da7b078b630709f4af3fe4399fd3b64cd1

                                                                                      SHA512

                                                                                      8f5cb1d3d0a9d1b4e5c26d26fae260e495cffa071f26d07cc921ad031f77b4ca565eb8d5a0e48ad3f0924a33dc902381b75ef66fc4cfe267325ad82527aa94e9

                                                                                    • C:\Windows\System\PqGCUtK.exe

                                                                                      Filesize

                                                                                      1.1MB

                                                                                      MD5

                                                                                      cdcf7356647142d422479f05aad1001b

                                                                                      SHA1

                                                                                      2fda40d60a5615f87789846dc8219bea51def515

                                                                                      SHA256

                                                                                      2cbe7d6b79d031ef87e25b9df210f15a283114a83369809ccac96683171ab551

                                                                                      SHA512

                                                                                      30ff3785f4f2744e1b83fc3ae807e49c2e99d8ebda936a47f59bd97d0ed22a8fce2c2933fd2a4452a2399dd28d53bea5e5764a413a49014c1a4fa6622137e1e5

                                                                                    • C:\Windows\System\WeoFLof.exe

                                                                                      Filesize

                                                                                      768KB

                                                                                      MD5

                                                                                      096410221e55421e5c4c4275c7d21513

                                                                                      SHA1

                                                                                      a9a3350bb5b616aee4d0c922dc225694f8027702

                                                                                      SHA256

                                                                                      1162e04ab5acff6cf895e753ad87619013ecfffc06f47ed477cf1c201c040e66

                                                                                      SHA512

                                                                                      b442b0d589e49e95f8c072f6f97ae946c91e082ea0e6557eeef4f55282d6675cb325a5ba42eb1799fb9bff049919d0eef469abfd200cb35fe59f78974905588c

                                                                                    • C:\Windows\System\XCxFFTM.exe

                                                                                      Filesize

                                                                                      896KB

                                                                                      MD5

                                                                                      d8061570a3d685a09a8726d2e2043dcd

                                                                                      SHA1

                                                                                      5784ed9099dd4b61b63fc8ab2f585fc9e4456099

                                                                                      SHA256

                                                                                      2858747fe15b825bca2004f1fb5434e70a8f8952f994cb7850f53fc69e794e72

                                                                                      SHA512

                                                                                      491823d9b7c3d0e919d65b711645bd0839fa6e3b7a404dd101f61c497b50d40cc12658380d09032bb5d5d2ac84e5d2791f8235e5d4c6f54ca1090b042d3a4b7a

                                                                                    • C:\Windows\System\XCxFFTM.exe

                                                                                      Filesize

                                                                                      256KB

                                                                                      MD5

                                                                                      c852d0de044ecfdc8164664b8ea3dc6f

                                                                                      SHA1

                                                                                      cfc38798bcbec8419f442fddcbe34cb37971445d

                                                                                      SHA256

                                                                                      32715d7c1c8dcbb10f1add6b003e18def383412f1b6c48f4d9670b8e3ef1d0b7

                                                                                      SHA512

                                                                                      e03bd3ea4470974d8087b8d17ce90233e5a96284236038a869c3b63a693e9a7c9719f6671b6b5d0dbeb167dd4786cd1b7a4b214b02967aac04fad66c8195132f

                                                                                    • C:\Windows\System\eNJMPai.exe

                                                                                      Filesize

                                                                                      64KB

                                                                                      MD5

                                                                                      51e4020b90426a266032ae5bcb74e5b3

                                                                                      SHA1

                                                                                      242fa8dc7d05d7b78f629fe2652627274810a122

                                                                                      SHA256

                                                                                      5984cb4794a67b4fd33c39a8582f294030d387db17fdb4933391142fb7f614c6

                                                                                      SHA512

                                                                                      5acda5a7b0ce962164cbb0c2fe75fb43a2d35d269fbb33e0eda06f3daf5a3cc37b11c0b76c58b3b3846604a879813821c87b0ead541065090905bfc897125758

                                                                                    • C:\Windows\System\hUuhnId.exe

                                                                                      Filesize

                                                                                      512KB

                                                                                      MD5

                                                                                      6b5887af4274a78686a788865765637c

                                                                                      SHA1

                                                                                      5afc15e6fcbc11377bbabbda47ff43f6ebedd369

                                                                                      SHA256

                                                                                      ecdfed9bc02368fefbebe0d02090e93826b7e5cc1043e339dd245299c8b23006

                                                                                      SHA512

                                                                                      4f563e539f8ec68bbc27d4cc59c42ea4897bb131085e08433f745cc558ab7a030701a601ddb711cda19dfa6cd9086b458fb74762092be15aaa4190c05134d077

                                                                                    • C:\Windows\System\vDSCseZ.exe

                                                                                      Filesize

                                                                                      448KB

                                                                                      MD5

                                                                                      0642442db4acbbfb6037e06789624264

                                                                                      SHA1

                                                                                      923aee440a6887c7a7a8a78085aa492b2cdcee65

                                                                                      SHA256

                                                                                      5d6249e3d37c32c515e6f20e0771180c7b51c791102dfffe39e4510d623eda85

                                                                                      SHA512

                                                                                      7fc8231c299b64743a966130c519362217b11d421c0ccc65ca7c97570221449b6e5bd90caefa97b416470db36fac07c3f48ea41836b395ab190e6121598e88a1

                                                                                    • C:\Windows\System\vVcUUUM.exe

                                                                                      Filesize

                                                                                      640KB

                                                                                      MD5

                                                                                      469aca0e2abc33bcc5100f89b3196890

                                                                                      SHA1

                                                                                      b77c2be76b0bcd5c1640c82143bf4ae8abf6ed35

                                                                                      SHA256

                                                                                      8e4d419e754f89fae1d30741df9483d06709f6d20541cbce976b97c6b74f264f

                                                                                      SHA512

                                                                                      bb8f27156094a7b200e5c1844466de9827240ad5c62598ca983899918fcfddc76480438ab7ff457f4059655d26f5dee65f9d3ba57dc850a7e0c1c267d7e2bdae

                                                                                    • C:\Windows\System\vVcUUUM.exe

                                                                                      Filesize

                                                                                      320KB

                                                                                      MD5

                                                                                      d21590ae8170aaccbcd19e7067ab6994

                                                                                      SHA1

                                                                                      10f350169749c21440531509a3e7295f89c18083

                                                                                      SHA256

                                                                                      46a31c66a5e2b5dc524bccbbcd87f163f058b2fedffe048e3850fee93fbd703a

                                                                                      SHA512

                                                                                      0a218e8b4f06e2867073755e2a8ca9407d373ed70a6cdd1433032aeda4491ab35054bde1767383405cb6459bec67b81063efb85a1f210d8040c877770e4e047f

                                                                                    • C:\Windows\System\zITGLcg.exe

                                                                                      Filesize

                                                                                      384KB

                                                                                      MD5

                                                                                      6207c08555e637186de329c9179e16d9

                                                                                      SHA1

                                                                                      09098b1d2cbfb2ab317439f6c4fc0121d5b8f70a

                                                                                      SHA256

                                                                                      90e60744ec9da51fba847be626db348bca6bdaf98ac91b116446f5b42433003b

                                                                                      SHA512

                                                                                      a17015ce5be9dbe107f45a5361c78d0722d3574d1684f1ab5a78044304a8f13b281179a8bde4be29c0529678da2d8332817db568d46fd1e81541274c1a2a6ea7

                                                                                    • C:\Windows\System\zITGLcg.exe

                                                                                      Filesize

                                                                                      1.3MB

                                                                                      MD5

                                                                                      9eeea66f157ac34d83b7a0966209d4d0

                                                                                      SHA1

                                                                                      ced5cc1e4cf45a88dc6d7efcd84a3f22e144411c

                                                                                      SHA256

                                                                                      865d7e46244f2223938d5942f7345634806ca8546554899f39444483759f7b4b

                                                                                      SHA512

                                                                                      32427a4b4d1533a5223b55058846a86c1dd81df406d07e656de08906b64aa5f6b7e3b8d55231f43d834208dac04060b46d7884231ed95b21e0d5fac744db915c

                                                                                    • C:\Windows\System\zzxDxjb.exe

                                                                                      Filesize

                                                                                      960KB

                                                                                      MD5

                                                                                      180ec18cff675908ea09fb02b8edeae7

                                                                                      SHA1

                                                                                      908a0fde6e66598e819044f800d2fb12a2c2d5e4

                                                                                      SHA256

                                                                                      35e0571c2720559fc2e392ef1ac01a4890a7f5a52de790fe0560ba1ddb8b0978

                                                                                      SHA512

                                                                                      f4efca4f8c80307ac309f06271cca1b553bd93330b442aaa71749f3ce5f3d47dab778dbee66162c088762bb8f4726a65ed8e5313f9bd8da09d951b910b9f8e49

                                                                                    • memory/228-497-0x00007FF7D7950000-0x00007FF7D7CA4000-memory.dmp

                                                                                      Filesize

                                                                                      3.3MB

                                                                                    • memory/332-604-0x00007FF7E6CC0000-0x00007FF7E7014000-memory.dmp

                                                                                      Filesize

                                                                                      3.3MB

                                                                                    • memory/848-599-0x00007FF7043E0000-0x00007FF704734000-memory.dmp

                                                                                      Filesize

                                                                                      3.3MB

                                                                                    • memory/1332-1146-0x00007FF6002B0000-0x00007FF600604000-memory.dmp

                                                                                      Filesize

                                                                                      3.3MB

                                                                                    • memory/1456-1175-0x00007FF68BB00000-0x00007FF68BE54000-memory.dmp

                                                                                      Filesize

                                                                                      3.3MB

                                                                                    • memory/2568-1174-0x00007FF627D20000-0x00007FF628074000-memory.dmp

                                                                                      Filesize

                                                                                      3.3MB

                                                                                    • memory/3368-1006-0x00007FF7AD8D0000-0x00007FF7ADC24000-memory.dmp

                                                                                      Filesize

                                                                                      3.3MB

                                                                                    • memory/3532-38-0x00007FF622940000-0x00007FF622C94000-memory.dmp

                                                                                      Filesize

                                                                                      3.3MB

                                                                                    • memory/3780-12-0x00007FF72E400000-0x00007FF72E754000-memory.dmp

                                                                                      Filesize

                                                                                      3.3MB

                                                                                    • memory/4600-596-0x00007FF603870000-0x00007FF603BC4000-memory.dmp

                                                                                      Filesize

                                                                                      3.3MB

                                                                                    • memory/4692-1-0x00000116074E0000-0x00000116074F0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4692-0-0x00007FF728D90000-0x00007FF7290E4000-memory.dmp

                                                                                      Filesize

                                                                                      3.3MB