Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
286s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 10:25
Behavioral task
behavioral1
Sample
testx2-main/WinRing0x64.sys
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
testx2-main/WinRing0x64.sys
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
testx2-main/xmrigDaemon.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
testx2-main/xmrigDaemon.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
testx2-main/xmrigMiner.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
testx2-main/xmrigMiner.exe
Resource
win10v2004-20240704-en
General
-
Target
testx2-main/xmrigDaemon.exe
-
Size
362KB
-
MD5
b16954807827ccfa1e4738fce1089b62
-
SHA1
b2f6607d68e4d197892c515b16b3f61252304120
-
SHA256
2f8c68901f8df6f67796a8a892dd517c2011b93f271da04ed55448e9686ad984
-
SHA512
48726f50886b81a08317a0db0171ae3264880d43514086766e3f9a354b59101cf0755f8d815ad6979eab8c7fcc62969ff977ed9d780f30323f6143697869c0ed
-
SSDEEP
6144:eluUm0Yxw8f9ZzJ83K1woh8iMFJrCK1vHkk:eIUmXw29EYwoip
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2844 xmrigMiner.exe Token: SeLockMemoryPrivilege 2844 xmrigMiner.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 xmrigMiner.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2840 2708 xmrigDaemon.exe 32 PID 2708 wrote to memory of 2840 2708 xmrigDaemon.exe 32 PID 2708 wrote to memory of 2840 2708 xmrigDaemon.exe 32 PID 2840 wrote to memory of 2844 2840 cmd.exe 33 PID 2840 wrote to memory of 2844 2840 cmd.exe 33 PID 2840 wrote to memory of 2844 2840 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigDaemon.exe"C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigDaemon.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exe" --daemonized2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exeC:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exe --daemonized3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2844
-
-