Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
4e9292f02efc44abd5a2671439283405.exe
Resource
win7-20231129-en
General
-
Target
4e9292f02efc44abd5a2671439283405.exe
-
Size
5.0MB
-
MD5
4e9292f02efc44abd5a2671439283405
-
SHA1
8fe8f59ad5cbb35115a3e997848b1f9c968dccfb
-
SHA256
53b0c0f60949cc15b4514b8fb1642bef07c5c65a48e4adc247da22a254b66437
-
SHA512
f0774ed0643c9c35de61c133e03640596b3dd64f8d26c4b9b959fe51678a4775be39fb2ddea8402342b3f341642a3e0a80f656dd567239535c270df5d25fbc43
-
SSDEEP
98304:sF322L5o+zIKbC+YO61IxwSXxfuGtaoZohphcnZCdHHugWdDfDHOaRighoYU:sF322lor4C/O6etbTZohXZdnupDfD1R0
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral2/memory/1376-19-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1376-22-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1376-25-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1376-24-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1376-23-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1376-20-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1376-26-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1376-27-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts 4e9292f02efc44abd5a2671439283405.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Executes dropped EXE 1 IoCs
pid Process 3160 updater.exe -
resource yara_rule behavioral2/memory/1376-15-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-18-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-19-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-22-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-25-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-24-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-23-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-20-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-14-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-26-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1376-27-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3160 set thread context of 2292 3160 updater.exe 116 PID 3160 set thread context of 1376 3160 updater.exe 121 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3360 sc.exe 5076 sc.exe 3048 sc.exe 1932 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2372 4e9292f02efc44abd5a2671439283405.exe 2372 4e9292f02efc44abd5a2671439283405.exe 2372 4e9292f02efc44abd5a2671439283405.exe 2372 4e9292f02efc44abd5a2671439283405.exe 2372 4e9292f02efc44abd5a2671439283405.exe 2372 4e9292f02efc44abd5a2671439283405.exe 2372 4e9292f02efc44abd5a2671439283405.exe 2372 4e9292f02efc44abd5a2671439283405.exe 3160 updater.exe 3160 updater.exe 3160 updater.exe 3160 updater.exe 3160 updater.exe 3160 updater.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe 1376 explorer.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 3704 powercfg.exe Token: SeCreatePagefilePrivilege 3704 powercfg.exe Token: SeShutdownPrivilege 3480 powercfg.exe Token: SeCreatePagefilePrivilege 3480 powercfg.exe Token: SeShutdownPrivilege 380 powercfg.exe Token: SeCreatePagefilePrivilege 380 powercfg.exe Token: SeShutdownPrivilege 4928 powercfg.exe Token: SeCreatePagefilePrivilege 4928 powercfg.exe Token: SeShutdownPrivilege 5024 powercfg.exe Token: SeCreatePagefilePrivilege 5024 powercfg.exe Token: SeShutdownPrivilege 2012 powercfg.exe Token: SeCreatePagefilePrivilege 2012 powercfg.exe Token: SeShutdownPrivilege 4052 powercfg.exe Token: SeCreatePagefilePrivilege 4052 powercfg.exe Token: SeShutdownPrivilege 2708 powercfg.exe Token: SeCreatePagefilePrivilege 2708 powercfg.exe Token: SeLockMemoryPrivilege 1376 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3160 wrote to memory of 2292 3160 updater.exe 116 PID 3160 wrote to memory of 2292 3160 updater.exe 116 PID 3160 wrote to memory of 2292 3160 updater.exe 116 PID 3160 wrote to memory of 2292 3160 updater.exe 116 PID 3160 wrote to memory of 2292 3160 updater.exe 116 PID 3160 wrote to memory of 2292 3160 updater.exe 116 PID 3160 wrote to memory of 2292 3160 updater.exe 116 PID 3160 wrote to memory of 2292 3160 updater.exe 116 PID 3160 wrote to memory of 2292 3160 updater.exe 116 PID 3160 wrote to memory of 1376 3160 updater.exe 121 PID 3160 wrote to memory of 1376 3160 updater.exe 121 PID 3160 wrote to memory of 1376 3160 updater.exe 121 PID 3160 wrote to memory of 1376 3160 updater.exe 121 PID 3160 wrote to memory of 1376 3160 updater.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e9292f02efc44abd5a2671439283405.exe"C:\Users\Admin\AppData\Local\Temp\4e9292f02efc44abd5a2671439283405.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQCW"2⤵
- Launches sc.exe
PID:3360
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQCW" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"2⤵
- Launches sc.exe
PID:5076
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:3048
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQCW"2⤵
- Launches sc.exe
PID:1932
-
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2292
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD54e9292f02efc44abd5a2671439283405
SHA18fe8f59ad5cbb35115a3e997848b1f9c968dccfb
SHA25653b0c0f60949cc15b4514b8fb1642bef07c5c65a48e4adc247da22a254b66437
SHA512f0774ed0643c9c35de61c133e03640596b3dd64f8d26c4b9b959fe51678a4775be39fb2ddea8402342b3f341642a3e0a80f656dd567239535c270df5d25fbc43
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62