Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 01:20

General

  • Target

    40331d6e3d18c61d5591aa85fc455f6674e78924ce4660ce18221aa49f696779.exe

  • Size

    3.1MB

  • MD5

    2f03ead3988fc2b5e16470ed0a96557d

  • SHA1

    4d0dcb7ebb340af8887fdec5f665eb091db9caf6

  • SHA256

    40331d6e3d18c61d5591aa85fc455f6674e78924ce4660ce18221aa49f696779

  • SHA512

    799830b418d6bf37a4d7bcd9649ee6d2f0551101029fecb5e44e8115fd7e29daabd8e662e316565bd6e1e36aaf9c26a82c49c7bd65e7eb28a73e9c3930c90ca6

  • SSDEEP

    49152:ByTeFwtj0HLirwzPPk/iZuKsZxof6SD3nlOyT3Pwsu8/Cf6PyBXEjk1:ByVEer3/iQZxofZXlOaN/Cf66NEa

Malware Config

Signatures

  • XMRig Miner payload 2 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects executables packed with VMProtect. 4 IoCs
  • Creates new service(s) 2 TTPs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in Windows directory 20 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40331d6e3d18c61d5591aa85fc455f6674e78924ce4660ce18221aa49f696779.exe
    "C:\Users\Admin\AppData\Local\Temp\40331d6e3d18c61d5591aa85fc455f6674e78924ce4660ce18221aa49f696779.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Windows\Fonts\systam33\w.exe
      "C:\Windows\Fonts\systam33\w.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4236
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\HZ~32E7.tmp.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4660
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 2
          4⤵
          • Runs ping.exe
          PID:3120
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systam33\w.bat" "
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\SysWOW64\mode.com
        mode con: cols=16 lines=2
        3⤵
          PID:1936
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:2820
        • C:\Windows\SysWOW64\sc.exe
          sc create UmRdpSerivce binPath= C:\Windows\Fonts\systam33\svchost.exe start= auto
          3⤵
          • Launches sc.exe
          PID:216
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:2964
        • C:\Windows\Fonts\systam33\csrss.exe
          csrss set UmRdpSerivce DisplayName "Remote Desktop Services UserMode Port Redriector"
          3⤵
          • Executes dropped EXE
          PID:832
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:5100
        • C:\Windows\Fonts\systam33\csrss.exe
          csrss set UmRdpSerivce Description "Allows the redirection of Printers/Drives/Ports for RDP connectoins"
          3⤵
          • Executes dropped EXE
          PID:2220
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:1992
        • C:\Windows\SysWOW64\sc.exe
          sc start UmRdpSerivce
          3⤵
          • Launches sc.exe
          PID:1000
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:5104
        • C:\Windows\SysWOW64\regini.exe
          regini 1.ini
          3⤵
            PID:3456
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\HZ~31BE.tmp.bat"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:5068
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            3⤵
            • Runs ping.exe
            PID:2488
      • C:\Windows\Fonts\systam33\svchost.exe
        C:\Windows\Fonts\systam33\svchost.exe
        1⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Windows\Fonts\chrome\chrome.exe
          C:\Windows\Fonts\chrome\chrome.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1716

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\HZ~31BE.tmp.bat

        Filesize

        266B

        MD5

        515c5ab1bba53eb7acbf281eba8374e0

        SHA1

        6765a6f12b36bdd914aab7b093b8738d7288d4e0

        SHA256

        a48bcdb7a59fce333ddcd1e33e6547df049231ad42f032440aaa51075f9ac943

        SHA512

        cc7416c518866fa1969f22ccdcae7658ab3c6a6de424829565937b41f455338d7e13c401131ff2611e8d8af4d5c26994ed6a81896f62dd2c995cde8824045ffa

      • C:\Users\Admin\AppData\Local\Temp\HZ~32E7.tmp.bat

        Filesize

        124B

        MD5

        9e8e1faaaf54789725159a1e527e8a15

        SHA1

        edec5b0de9a98b93106d8e951b323007d6b62726

        SHA256

        4150d0db0898ea43c5ac912fa94dc8567783755d3252bd28e3d40c5de4758851

        SHA512

        723c6751215188cfd81d57d873522b56724a0a6c7fdfe38c730a648a43b98db024bcd482de224b5d4201188f91d264bb4dacc653fdea2d1a3f0a8dc11e979b81

      • C:\Windows\Fonts\chrome\chrome.exe

        Filesize

        5.2MB

        MD5

        6b592d1cceaf329c68acaff75fb80be2

        SHA1

        ebf5f792c4672973d366b14715b828e9e6e18dac

        SHA256

        f6be8784ea31ee34b36efe2cb5d68bfec8fa33ab1a550c6fccb63cf469fe1208

        SHA512

        4d32d48c29487eea40e3decfe9cc05e40c356df46eca51ac4ccef0bbb31abfb441f592b3bbd491ef5748865637f4420ebfbb76ab5e3df221148e8de8ba8f5138

      • C:\Windows\Fonts\chrome\config.json

        Filesize

        2KB

        MD5

        3a2058068bc4a85ecd8edb7a7ebd3b09

        SHA1

        6f3ee264746612708e6cb1edd5b1e998bb9cfd5e

        SHA256

        f332695c2d7a40f634b93befbb479d854934cdf7d09bac8450382ea94c971239

        SHA512

        39e18d39522a2db7e0c9db438e51901810efa20fb3d9125467e4025fff012024decf2601d2d9731b619d5f189715fcafff07f751c9e579fcfee3394897f5e3d3

      • C:\Windows\Fonts\systam33\1.ini

        Filesize

        73B

        MD5

        792c1d6adbc2d208c00b35e55d1d98d6

        SHA1

        dd15327dd92517b395d0873f1655e60097455a29

        SHA256

        f093e254d918363e7f1e61b1f3b76692395f96d124fae1b77cb791e3a1a286bd

        SHA512

        c1ccaef5f5ff78a613d2dd1271af4427ad94797d3f9bf26f5a30637376435dfd7a51cc23844dc9ac6553b43775507d3b2def8b867f1a5305feb1ad0c4bfe1801

      • C:\Windows\Fonts\systam33\csrss.exe

        Filesize

        286KB

        MD5

        b80172424d378e595b8ed4254ea7a492

        SHA1

        56d2049d50c38ff3e0fda94f0af5344c253abe35

        SHA256

        c67b6e6bde919aec414bc2176a77d6082758636e8d60d2ca83198a10d4cec9c7

        SHA512

        7de17c82076248e253335319970010b73e87ecb5c3ed00387a9d353edc31afbfcc58f09afbe3edacc1cef8b637d4d272cbf13d857135e7fbb364c0f3a7a9dd85

      • C:\Windows\Fonts\systam33\svchost.exe

        Filesize

        684KB

        MD5

        cf7341a71cb0117e651fd1b4dc414657

        SHA1

        b34b4aa0f90fa9e02d4bd3fc64644b07d27876f4

        SHA256

        d55e4e16c8c60095c9897bea7db8fb71bf099008a3bc942a6062ffd5c0f05b27

        SHA512

        a161caafacaea87caada40b52753512ca83242e3c5a129793686843fdecb667e0fa5b92a384c260a7f11f38009fa787a39e8487628fb52bb81c1dd813c293859

      • C:\Windows\Fonts\systam33\svchost.ini

        Filesize

        252B

        MD5

        62eb1b85bc112779e5bf0d380e92476d

        SHA1

        e32ecf8b742db94681b9dc6ad6bc7da966699fb2

        SHA256

        49fa9854a9283cf2f82d1a2e9be542ee438069542f3ab8acbb93e130968df463

        SHA512

        3a44c33a3793b29f0d060265e1e448b228b49f404a6dec88222798606da57063a7cf6f03bcc0aa93bd9c4e05d4b1e70da136a1eac901dd6e727837cfe4607df3

      • C:\Windows\Fonts\systam33\w.bat

        Filesize

        531B

        MD5

        48b7fb879283096712fca22f385750f1

        SHA1

        7ba4395c9a84f6df15fb38cbc325fed38ee3a75a

        SHA256

        d6f5b894cfb148c85f5176ddb7426d82c742769c38a0c5be29b93a1b9fdfce3b

        SHA512

        fe3849c9139721978781bce2bb3fa97270f61df890ed79b6ecf4d7499351f12d474341dbcb89a9afb15bf54e081b79f06e34667832afee1377ec719a6326473b

      • C:\Windows\Fonts\systam33\w.exe

        Filesize

        2.2MB

        MD5

        e18bb32fccbca160f1e64777065a7f9c

        SHA1

        c94a7c7f6e74bbd25e6e3a2f20d1888de1d73c39

        SHA256

        8d3e6f50c5ec01cff2af94c635942daf3a55a43453639755acc1b5d27c51b6ab

        SHA512

        8c4ec28de9443ae439b256afa108902ecf75a091d177be03abe059e75db597c3451917fd8f37f48e3024be5521678781a7029fce71ac367d1b8491a08ee3ca05

      • memory/1716-51-0x00000192BDCC0000-0x00000192BDCE0000-memory.dmp

        Filesize

        128KB

      • memory/1752-41-0x0000000000400000-0x000000000055E000-memory.dmp

        Filesize

        1.4MB

      • memory/1752-42-0x0000000000400000-0x000000000055E000-memory.dmp

        Filesize

        1.4MB

      • memory/1752-55-0x0000000000400000-0x000000000055E000-memory.dmp

        Filesize

        1.4MB