Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
4e9292f02efc44abd5a2671439283405.exe
Resource
win7-20231129-en
General
-
Target
4e9292f02efc44abd5a2671439283405.exe
-
Size
5.0MB
-
MD5
4e9292f02efc44abd5a2671439283405
-
SHA1
8fe8f59ad5cbb35115a3e997848b1f9c968dccfb
-
SHA256
53b0c0f60949cc15b4514b8fb1642bef07c5c65a48e4adc247da22a254b66437
-
SHA512
f0774ed0643c9c35de61c133e03640596b3dd64f8d26c4b9b959fe51678a4775be39fb2ddea8402342b3f341642a3e0a80f656dd567239535c270df5d25fbc43
-
SSDEEP
98304:sF322L5o+zIKbC+YO61IxwSXxfuGtaoZohphcnZCdHHugWdDfDHOaRighoYU:sF322lor4C/O6etbTZohXZdnupDfD1R0
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2472-21-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2472-27-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2472-24-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2472-26-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2472-28-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2472-25-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2472-22-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2472-29-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts 4e9292f02efc44abd5a2671439283405.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Executes dropped EXE 2 IoCs
pid Process 480 Process not Found 2728 updater.exe -
Loads dropped DLL 1 IoCs
pid Process 480 Process not Found -
resource yara_rule behavioral1/memory/2472-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-21-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-27-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-24-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-26-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-28-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-25-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-22-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-19-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-20-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-18-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2472-29-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2728 set thread context of 2492 2728 updater.exe 49 PID 2728 set thread context of 2472 2728 updater.exe 54 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2176 sc.exe 2600 sc.exe 2692 sc.exe 2704 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1652 4e9292f02efc44abd5a2671439283405.exe 1652 4e9292f02efc44abd5a2671439283405.exe 1652 4e9292f02efc44abd5a2671439283405.exe 1652 4e9292f02efc44abd5a2671439283405.exe 1652 4e9292f02efc44abd5a2671439283405.exe 1652 4e9292f02efc44abd5a2671439283405.exe 1652 4e9292f02efc44abd5a2671439283405.exe 1652 4e9292f02efc44abd5a2671439283405.exe 2728 updater.exe 2728 updater.exe 2728 updater.exe 2728 updater.exe 2728 updater.exe 2728 updater.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeShutdownPrivilege 2384 powercfg.exe Token: SeShutdownPrivilege 3032 powercfg.exe Token: SeShutdownPrivilege 3064 powercfg.exe Token: SeShutdownPrivilege 1948 powercfg.exe Token: SeShutdownPrivilege 2656 powercfg.exe Token: SeShutdownPrivilege 2760 powercfg.exe Token: SeShutdownPrivilege 2148 powercfg.exe Token: SeShutdownPrivilege 2720 powercfg.exe Token: SeLockMemoryPrivilege 2472 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2492 2728 updater.exe 49 PID 2728 wrote to memory of 2492 2728 updater.exe 49 PID 2728 wrote to memory of 2492 2728 updater.exe 49 PID 2728 wrote to memory of 2492 2728 updater.exe 49 PID 2728 wrote to memory of 2492 2728 updater.exe 49 PID 2728 wrote to memory of 2492 2728 updater.exe 49 PID 2728 wrote to memory of 2492 2728 updater.exe 49 PID 2728 wrote to memory of 2492 2728 updater.exe 49 PID 2728 wrote to memory of 2492 2728 updater.exe 49 PID 2728 wrote to memory of 2472 2728 updater.exe 54 PID 2728 wrote to memory of 2472 2728 updater.exe 54 PID 2728 wrote to memory of 2472 2728 updater.exe 54 PID 2728 wrote to memory of 2472 2728 updater.exe 54 PID 2728 wrote to memory of 2472 2728 updater.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e9292f02efc44abd5a2671439283405.exe"C:\Users\Admin\AppData\Local\Temp\4e9292f02efc44abd5a2671439283405.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQCW"2⤵
- Launches sc.exe
PID:2176
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQCW" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"2⤵
- Launches sc.exe
PID:2600
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2692
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQCW"2⤵
- Launches sc.exe
PID:2704
-
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2492
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
5.0MB
MD54e9292f02efc44abd5a2671439283405
SHA18fe8f59ad5cbb35115a3e997848b1f9c968dccfb
SHA25653b0c0f60949cc15b4514b8fb1642bef07c5c65a48e4adc247da22a254b66437
SHA512f0774ed0643c9c35de61c133e03640596b3dd64f8d26c4b9b959fe51678a4775be39fb2ddea8402342b3f341642a3e0a80f656dd567239535c270df5d25fbc43