Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
23s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 23:16
Behavioral task
behavioral1
Sample
be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe
Resource
win7-20240220-en
General
-
Target
be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe
-
Size
2.2MB
-
MD5
145885152996bd9f1bfc163a316e0aa3
-
SHA1
f698d078213ee9adb3611f764aae78d9845f67a8
-
SHA256
be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3
-
SHA512
2c31b4eb6caf092b7b92df4192838db4ae9a0c4f028e56d14f5f6a6c3fc4a0629461aa6d553978d35aeaf9b76a060fbe8040940d92898b3477c165ff1d9d0111
-
SSDEEP
49152:BezaTF8FcNkNdfE0pZ9ozt4wICbbnlD52UUrcl:BemTLkNdfE0pZrS
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 15 IoCs
resource yara_rule behavioral2/memory/4692-0-0x00007FF728D90000-0x00007FF7290E4000-memory.dmp UPX behavioral2/files/0x000400000001e980-5.dat UPX behavioral2/files/0x000400000001e980-6.dat UPX behavioral2/files/0x000b0000000231aa-9.dat UPX behavioral2/files/0x0007000000023222-56.dat UPX behavioral2/files/0x000700000002321c-75.dat UPX behavioral2/files/0x0007000000023223-60.dat UPX behavioral2/files/0x0007000000023221-55.dat UPX behavioral2/files/0x000700000002321c-27.dat UPX behavioral2/files/0x000d000000023164-28.dat UPX behavioral2/files/0x000700000002321a-24.dat UPX behavioral2/files/0x000b0000000231aa-17.dat UPX behavioral2/files/0x0007000000023226-131.dat UPX behavioral2/files/0x000700000002322f-134.dat UPX behavioral2/files/0x0007000000023227-169.dat UPX -
XMRig Miner payload 25 IoCs
resource yara_rule behavioral2/memory/4692-0-0x00007FF728D90000-0x00007FF7290E4000-memory.dmp xmrig behavioral2/files/0x000400000001e980-5.dat xmrig behavioral2/files/0x000400000001e980-6.dat xmrig behavioral2/memory/3780-12-0x00007FF72E400000-0x00007FF72E754000-memory.dmp xmrig behavioral2/files/0x000b0000000231aa-9.dat xmrig behavioral2/memory/3532-38-0x00007FF622940000-0x00007FF622C94000-memory.dmp xmrig behavioral2/files/0x0007000000023222-56.dat xmrig behavioral2/files/0x000700000002321c-75.dat xmrig behavioral2/files/0x0007000000023223-60.dat xmrig behavioral2/files/0x0007000000023221-55.dat xmrig behavioral2/files/0x000700000002321c-27.dat xmrig behavioral2/files/0x000d000000023164-28.dat xmrig behavioral2/files/0x000700000002321a-24.dat xmrig behavioral2/files/0x000b0000000231aa-17.dat xmrig behavioral2/files/0x0007000000023226-131.dat xmrig behavioral2/files/0x000700000002322f-134.dat xmrig behavioral2/files/0x0007000000023227-169.dat xmrig behavioral2/memory/228-497-0x00007FF7D7950000-0x00007FF7D7CA4000-memory.dmp xmrig behavioral2/memory/4600-596-0x00007FF603870000-0x00007FF603BC4000-memory.dmp xmrig behavioral2/memory/848-599-0x00007FF7043E0000-0x00007FF704734000-memory.dmp xmrig behavioral2/memory/332-604-0x00007FF7E6CC0000-0x00007FF7E7014000-memory.dmp xmrig behavioral2/memory/3368-1006-0x00007FF7AD8D0000-0x00007FF7ADC24000-memory.dmp xmrig behavioral2/memory/1332-1146-0x00007FF6002B0000-0x00007FF600604000-memory.dmp xmrig behavioral2/memory/2568-1174-0x00007FF627D20000-0x00007FF628074000-memory.dmp xmrig behavioral2/memory/1456-1175-0x00007FF68BB00000-0x00007FF68BE54000-memory.dmp xmrig -
Executes dropped EXE 3 IoCs
pid Process 3780 vVcUUUM.exe 2708 FzNwJCR.exe 3532 XCxFFTM.exe -
resource yara_rule behavioral2/memory/4692-0-0x00007FF728D90000-0x00007FF7290E4000-memory.dmp upx behavioral2/files/0x000400000001e980-5.dat upx behavioral2/files/0x000400000001e980-6.dat upx behavioral2/memory/3780-12-0x00007FF72E400000-0x00007FF72E754000-memory.dmp upx behavioral2/files/0x000b0000000231aa-9.dat upx behavioral2/memory/3532-38-0x00007FF622940000-0x00007FF622C94000-memory.dmp upx behavioral2/files/0x0007000000023222-56.dat upx behavioral2/files/0x000700000002321c-75.dat upx behavioral2/files/0x0007000000023223-60.dat upx behavioral2/files/0x0007000000023221-55.dat upx behavioral2/files/0x000700000002321c-27.dat upx behavioral2/files/0x000d000000023164-28.dat upx behavioral2/files/0x000700000002321a-24.dat upx behavioral2/files/0x000b0000000231aa-17.dat upx behavioral2/files/0x0007000000023226-131.dat upx behavioral2/files/0x000700000002322f-134.dat upx behavioral2/files/0x0007000000023227-169.dat upx behavioral2/memory/228-497-0x00007FF7D7950000-0x00007FF7D7CA4000-memory.dmp upx behavioral2/memory/4600-596-0x00007FF603870000-0x00007FF603BC4000-memory.dmp upx behavioral2/memory/848-599-0x00007FF7043E0000-0x00007FF704734000-memory.dmp upx behavioral2/memory/332-604-0x00007FF7E6CC0000-0x00007FF7E7014000-memory.dmp upx behavioral2/memory/3368-1006-0x00007FF7AD8D0000-0x00007FF7ADC24000-memory.dmp upx behavioral2/memory/1332-1146-0x00007FF6002B0000-0x00007FF600604000-memory.dmp upx behavioral2/memory/2568-1174-0x00007FF627D20000-0x00007FF628074000-memory.dmp upx behavioral2/memory/1456-1175-0x00007FF68BB00000-0x00007FF68BE54000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\System\NtqPSgm.exe be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe File created C:\Windows\System\XCxFFTM.exe be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe File created C:\Windows\System\vDSCseZ.exe be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe File created C:\Windows\System\FzNwJCR.exe be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe File created C:\Windows\System\vVcUUUM.exe be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3780 4692 be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe 89 PID 4692 wrote to memory of 3780 4692 be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe 89 PID 4692 wrote to memory of 224 4692 be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe 90 PID 4692 wrote to memory of 224 4692 be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe 90 PID 4692 wrote to memory of 3532 4692 be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe 91 PID 4692 wrote to memory of 3532 4692 be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe 91 PID 4692 wrote to memory of 4596 4692 be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe 92 PID 4692 wrote to memory of 4596 4692 be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe 92 PID 4692 wrote to memory of 2708 4692 be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe 93 PID 4692 wrote to memory of 2708 4692 be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe"C:\Users\Admin\AppData\Local\Temp\be49a091eb253f66169b4022ee873b98bbf33ea6ed1d1453709f5e304c71c1a3.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\System\vVcUUUM.exeC:\Windows\System\vVcUUUM.exe2⤵
- Executes dropped EXE
PID:3780
-
-
C:\Windows\System\NtqPSgm.exeC:\Windows\System\NtqPSgm.exe2⤵PID:224
-
-
C:\Windows\System\XCxFFTM.exeC:\Windows\System\XCxFFTM.exe2⤵
- Executes dropped EXE
PID:3532
-
-
C:\Windows\System\vDSCseZ.exeC:\Windows\System\vDSCseZ.exe2⤵PID:4596
-
-
C:\Windows\System\FzNwJCR.exeC:\Windows\System\FzNwJCR.exe2⤵
- Executes dropped EXE
PID:2708
-
-
C:\Windows\System\zITGLcg.exeC:\Windows\System\zITGLcg.exe2⤵PID:3684
-
-
C:\Windows\System\GLilzyI.exeC:\Windows\System\GLilzyI.exe2⤵PID:1472
-
-
C:\Windows\System\jMUuhSx.exeC:\Windows\System\jMUuhSx.exe2⤵PID:1820
-
-
C:\Windows\System\ZggyLqN.exeC:\Windows\System\ZggyLqN.exe2⤵PID:1016
-
-
C:\Windows\System\DTjyNNi.exeC:\Windows\System\DTjyNNi.exe2⤵PID:4968
-
-
C:\Windows\System\hUuhnId.exeC:\Windows\System\hUuhnId.exe2⤵PID:228
-
-
C:\Windows\System\WeoFLof.exeC:\Windows\System\WeoFLof.exe2⤵PID:3964
-
-
C:\Windows\System\zzxDxjb.exeC:\Windows\System\zzxDxjb.exe2⤵PID:4204
-
-
C:\Windows\System\KrZxUWv.exeC:\Windows\System\KrZxUWv.exe2⤵PID:3536
-
-
C:\Windows\System\xpzbySt.exeC:\Windows\System\xpzbySt.exe2⤵PID:4600
-
-
C:\Windows\System\PqGCUtK.exeC:\Windows\System\PqGCUtK.exe2⤵PID:3636
-
-
C:\Windows\System\ZvwhjAq.exeC:\Windows\System\ZvwhjAq.exe2⤵PID:2848
-
-
C:\Windows\System\sohGfdw.exeC:\Windows\System\sohGfdw.exe2⤵PID:3564
-
-
C:\Windows\System\jtvZDzT.exeC:\Windows\System\jtvZDzT.exe2⤵PID:848
-
-
C:\Windows\System\HnxTsEV.exeC:\Windows\System\HnxTsEV.exe2⤵PID:2816
-
-
C:\Windows\System\qBRmrUh.exeC:\Windows\System\qBRmrUh.exe2⤵PID:4884
-
-
C:\Windows\System\AxIhUkb.exeC:\Windows\System\AxIhUkb.exe2⤵PID:3548
-
-
C:\Windows\System\OHgUkGf.exeC:\Windows\System\OHgUkGf.exe2⤵PID:4880
-
-
C:\Windows\System\mDKMhoW.exeC:\Windows\System\mDKMhoW.exe2⤵PID:4460
-
-
C:\Windows\System\eNJMPai.exeC:\Windows\System\eNJMPai.exe2⤵PID:332
-
-
C:\Windows\System\vKJAdlr.exeC:\Windows\System\vKJAdlr.exe2⤵PID:3584
-
-
C:\Windows\System\ZBIZdBK.exeC:\Windows\System\ZBIZdBK.exe2⤵PID:4012
-
-
C:\Windows\System\zUnxfIP.exeC:\Windows\System\zUnxfIP.exe2⤵PID:3368
-
-
C:\Windows\System\jsbZWHn.exeC:\Windows\System\jsbZWHn.exe2⤵PID:1332
-
-
C:\Windows\System\WrtnBcP.exeC:\Windows\System\WrtnBcP.exe2⤵PID:2568
-
-
C:\Windows\System\SUCMNjC.exeC:\Windows\System\SUCMNjC.exe2⤵PID:1456
-
-
C:\Windows\System\qoMbVog.exeC:\Windows\System\qoMbVog.exe2⤵PID:3016
-
-
C:\Windows\System\wkuNkFv.exeC:\Windows\System\wkuNkFv.exe2⤵PID:2984
-
-
C:\Windows\System\BgUapcn.exeC:\Windows\System\BgUapcn.exe2⤵PID:4644
-
-
C:\Windows\System\nKISjZF.exeC:\Windows\System\nKISjZF.exe2⤵PID:2440
-
-
C:\Windows\System\WWArMdc.exeC:\Windows\System\WWArMdc.exe2⤵PID:4404
-
-
C:\Windows\System\rajJohd.exeC:\Windows\System\rajJohd.exe2⤵PID:4952
-
-
C:\Windows\System\YrpBtDc.exeC:\Windows\System\YrpBtDc.exe2⤵PID:5104
-
-
C:\Windows\System\uGwjwJB.exeC:\Windows\System\uGwjwJB.exe2⤵PID:6976
-
-
C:\Windows\System\RpXIWsO.exeC:\Windows\System\RpXIWsO.exe2⤵PID:6600
-
-
C:\Windows\System\eUEuoVa.exeC:\Windows\System\eUEuoVa.exe2⤵PID:6732
-
-
C:\Windows\System\hMmqZkL.exeC:\Windows\System\hMmqZkL.exe2⤵PID:7328
-
-
C:\Windows\System\EJtBOBI.exeC:\Windows\System\EJtBOBI.exe2⤵PID:11200
-
-
C:\Windows\System\JpQOjaJ.exeC:\Windows\System\JpQOjaJ.exe2⤵PID:9008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD52a352a5dac956a426621d06c163a834e
SHA1223f1e7ce63e127643b8e64e7a3d2a72ba570c04
SHA2569bf1caaff1c9eb8396e7658597d561da7b078b630709f4af3fe4399fd3b64cd1
SHA5128f5cb1d3d0a9d1b4e5c26d26fae260e495cffa071f26d07cc921ad031f77b4ca565eb8d5a0e48ad3f0924a33dc902381b75ef66fc4cfe267325ad82527aa94e9
-
Filesize
1.1MB
MD5cdcf7356647142d422479f05aad1001b
SHA12fda40d60a5615f87789846dc8219bea51def515
SHA2562cbe7d6b79d031ef87e25b9df210f15a283114a83369809ccac96683171ab551
SHA51230ff3785f4f2744e1b83fc3ae807e49c2e99d8ebda936a47f59bd97d0ed22a8fce2c2933fd2a4452a2399dd28d53bea5e5764a413a49014c1a4fa6622137e1e5
-
Filesize
768KB
MD5096410221e55421e5c4c4275c7d21513
SHA1a9a3350bb5b616aee4d0c922dc225694f8027702
SHA2561162e04ab5acff6cf895e753ad87619013ecfffc06f47ed477cf1c201c040e66
SHA512b442b0d589e49e95f8c072f6f97ae946c91e082ea0e6557eeef4f55282d6675cb325a5ba42eb1799fb9bff049919d0eef469abfd200cb35fe59f78974905588c
-
Filesize
896KB
MD5d8061570a3d685a09a8726d2e2043dcd
SHA15784ed9099dd4b61b63fc8ab2f585fc9e4456099
SHA2562858747fe15b825bca2004f1fb5434e70a8f8952f994cb7850f53fc69e794e72
SHA512491823d9b7c3d0e919d65b711645bd0839fa6e3b7a404dd101f61c497b50d40cc12658380d09032bb5d5d2ac84e5d2791f8235e5d4c6f54ca1090b042d3a4b7a
-
Filesize
256KB
MD5c852d0de044ecfdc8164664b8ea3dc6f
SHA1cfc38798bcbec8419f442fddcbe34cb37971445d
SHA25632715d7c1c8dcbb10f1add6b003e18def383412f1b6c48f4d9670b8e3ef1d0b7
SHA512e03bd3ea4470974d8087b8d17ce90233e5a96284236038a869c3b63a693e9a7c9719f6671b6b5d0dbeb167dd4786cd1b7a4b214b02967aac04fad66c8195132f
-
Filesize
64KB
MD551e4020b90426a266032ae5bcb74e5b3
SHA1242fa8dc7d05d7b78f629fe2652627274810a122
SHA2565984cb4794a67b4fd33c39a8582f294030d387db17fdb4933391142fb7f614c6
SHA5125acda5a7b0ce962164cbb0c2fe75fb43a2d35d269fbb33e0eda06f3daf5a3cc37b11c0b76c58b3b3846604a879813821c87b0ead541065090905bfc897125758
-
Filesize
512KB
MD56b5887af4274a78686a788865765637c
SHA15afc15e6fcbc11377bbabbda47ff43f6ebedd369
SHA256ecdfed9bc02368fefbebe0d02090e93826b7e5cc1043e339dd245299c8b23006
SHA5124f563e539f8ec68bbc27d4cc59c42ea4897bb131085e08433f745cc558ab7a030701a601ddb711cda19dfa6cd9086b458fb74762092be15aaa4190c05134d077
-
Filesize
448KB
MD50642442db4acbbfb6037e06789624264
SHA1923aee440a6887c7a7a8a78085aa492b2cdcee65
SHA2565d6249e3d37c32c515e6f20e0771180c7b51c791102dfffe39e4510d623eda85
SHA5127fc8231c299b64743a966130c519362217b11d421c0ccc65ca7c97570221449b6e5bd90caefa97b416470db36fac07c3f48ea41836b395ab190e6121598e88a1
-
Filesize
640KB
MD5469aca0e2abc33bcc5100f89b3196890
SHA1b77c2be76b0bcd5c1640c82143bf4ae8abf6ed35
SHA2568e4d419e754f89fae1d30741df9483d06709f6d20541cbce976b97c6b74f264f
SHA512bb8f27156094a7b200e5c1844466de9827240ad5c62598ca983899918fcfddc76480438ab7ff457f4059655d26f5dee65f9d3ba57dc850a7e0c1c267d7e2bdae
-
Filesize
320KB
MD5d21590ae8170aaccbcd19e7067ab6994
SHA110f350169749c21440531509a3e7295f89c18083
SHA25646a31c66a5e2b5dc524bccbbcd87f163f058b2fedffe048e3850fee93fbd703a
SHA5120a218e8b4f06e2867073755e2a8ca9407d373ed70a6cdd1433032aeda4491ab35054bde1767383405cb6459bec67b81063efb85a1f210d8040c877770e4e047f
-
Filesize
384KB
MD56207c08555e637186de329c9179e16d9
SHA109098b1d2cbfb2ab317439f6c4fc0121d5b8f70a
SHA25690e60744ec9da51fba847be626db348bca6bdaf98ac91b116446f5b42433003b
SHA512a17015ce5be9dbe107f45a5361c78d0722d3574d1684f1ab5a78044304a8f13b281179a8bde4be29c0529678da2d8332817db568d46fd1e81541274c1a2a6ea7
-
Filesize
1.3MB
MD59eeea66f157ac34d83b7a0966209d4d0
SHA1ced5cc1e4cf45a88dc6d7efcd84a3f22e144411c
SHA256865d7e46244f2223938d5942f7345634806ca8546554899f39444483759f7b4b
SHA51232427a4b4d1533a5223b55058846a86c1dd81df406d07e656de08906b64aa5f6b7e3b8d55231f43d834208dac04060b46d7884231ed95b21e0d5fac744db915c
-
Filesize
960KB
MD5180ec18cff675908ea09fb02b8edeae7
SHA1908a0fde6e66598e819044f800d2fb12a2c2d5e4
SHA25635e0571c2720559fc2e392ef1ac01a4890a7f5a52de790fe0560ba1ddb8b0978
SHA512f4efca4f8c80307ac309f06271cca1b553bd93330b442aaa71749f3ce5f3d47dab778dbee66162c088762bb8f4726a65ed8e5313f9bd8da09d951b910b9f8e49