Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 09:09
Behavioral task
behavioral1
Sample
c034e8320b0fe866c2aadcff0ac66e7e.exe
Resource
win7-20240215-en
General
-
Target
c034e8320b0fe866c2aadcff0ac66e7e.exe
-
Size
784KB
-
MD5
c034e8320b0fe866c2aadcff0ac66e7e
-
SHA1
941898981656786d4e5ef5ea4610d7d91095e89e
-
SHA256
1f5b89116555d610ff6b455fddfa4182295051db4ffc3dbbb883ef8b77db9be2
-
SHA512
14d33d7171c8a50f0ffd7b9b45931c82045797d11ca476732dd58332da4a16f0c703ffc7e0fe7fee2af53326fdca0c7d7ad7ba16cc47c7e554eb7df428303c9f
-
SSDEEP
12288:abGPEQPZ+EHtxCyIlA40JD0758b5cdLP3S+NMmCRTEnm:R8k+EHtkyhjO5cOdLfS+qmUTEn
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/980-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/980-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3532-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3532-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3532-20-0x0000000005400000-0x0000000005593000-memory.dmp xmrig behavioral2/memory/3532-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3532 c034e8320b0fe866c2aadcff0ac66e7e.exe -
Executes dropped EXE 1 IoCs
pid Process 3532 c034e8320b0fe866c2aadcff0ac66e7e.exe -
resource yara_rule behavioral2/memory/980-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/3532-12-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0008000000023212-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 980 c034e8320b0fe866c2aadcff0ac66e7e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 980 c034e8320b0fe866c2aadcff0ac66e7e.exe 3532 c034e8320b0fe866c2aadcff0ac66e7e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 980 wrote to memory of 3532 980 c034e8320b0fe866c2aadcff0ac66e7e.exe 90 PID 980 wrote to memory of 3532 980 c034e8320b0fe866c2aadcff0ac66e7e.exe 90 PID 980 wrote to memory of 3532 980 c034e8320b0fe866c2aadcff0ac66e7e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c034e8320b0fe866c2aadcff0ac66e7e.exe"C:\Users\Admin\AppData\Local\Temp\c034e8320b0fe866c2aadcff0ac66e7e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\c034e8320b0fe866c2aadcff0ac66e7e.exeC:\Users\Admin\AppData\Local\Temp\c034e8320b0fe866c2aadcff0ac66e7e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3532
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5b1a2f9564213cd7413d6e95914bc2011
SHA18f42c23662faf25f5d780401cefa3ca55110e5dd
SHA2565b83da38cdc076edd680c0898c8175d7bd91f0c868032af923de6903727b29b4
SHA51255027f253edead527279c66530a67fd228503bdf4c450ca737b42a9e86cd2cfe7ec714bd1fc2b39805548aa1fae4fb846273c00b74b371213cdd97a2787727e8