Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2024, 10:51

General

  • Target

    main - Copy (6) - Copy.exe

  • Size

    6.9MB

  • MD5

    22c978ffaefef3389bf29068b9621661

  • SHA1

    5671972c1d70826fb85dced4c83c700dd282ea21

  • SHA256

    e6ee8e9b38e10a92a89e61b8655ca4fedcc381fd93cb36f43fe323132923dfcf

  • SHA512

    8a280cb782f0afab171d2e7955b75362e98cefd449d382004ef2568c2c230cd633a754b1dd5f0dc5e17407819e4dceb5b0cbb2647e279a6ec674b8d9484be26a

  • SSDEEP

    98304:7b5Ak7khMiyw0VREqfnle5EEPbxVhCQHSIMf:5LUMiywZqshDxaQHh

Score
10/10

Malware Config

Signatures

  • XMRig Miner payload 16 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Executes dropped EXE 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\main - Copy (6) - Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\main - Copy (6) - Copy.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe
      xmrig-6.21.0\xmrig.exe --url pool.hashvault.pro:80 --user 46DiTxnXmukGpoGKFDViugiZA1Zuu181wJGSTvGVyJUv4HAdJaozh3jMX7nAEauswGVAUvLnY6tai2AbiKv9Pbt2EAsu8yR --pass T --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4968
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3064,i,3595107284059830391,18018199024659337217,262144 --variations-seed-version --mojo-platform-channel-handle=4296 /prefetch:8
    1⤵
      PID:2284

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\xmrig-6.21.0\xmrig.exe

      Filesize

      7.9MB

      MD5

      e2fe87cc2c7dab8ca6516620dccd1381

      SHA1

      f714ec0448325435103519452610cf7aadf8bbba

      SHA256

      d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4

      SHA512

      8455c47e8470e0e322426bc9b9f3c7e858d803bfc8c5d576d580f88585f550b95043139d69b0750a3e211915e3f5ec7a67e7784dcf8cac6bd8fe51ab7e9cbed6

    • memory/4968-14-0x00000227B2BA0000-0x00000227B2BC0000-memory.dmp

      Filesize

      128KB

    • memory/4968-15-0x00000227B2E00000-0x00000227B2E20000-memory.dmp

      Filesize

      128KB

    • memory/4968-16-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-18-0x00000227B2E20000-0x00000227B2E40000-memory.dmp

      Filesize

      128KB

    • memory/4968-17-0x00000227B2E40000-0x00000227B2E60000-memory.dmp

      Filesize

      128KB

    • memory/4968-19-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-20-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-23-0x00000227B2E20000-0x00000227B2E40000-memory.dmp

      Filesize

      128KB

    • memory/4968-22-0x00000227B2E40000-0x00000227B2E60000-memory.dmp

      Filesize

      128KB

    • memory/4968-21-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-24-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-25-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-26-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-27-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-28-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-29-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-30-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-31-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-32-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB

    • memory/4968-33-0x00007FF62DCF0000-0x00007FF62E7F3000-memory.dmp

      Filesize

      11.0MB