Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
246s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 10:25
Behavioral task
behavioral1
Sample
testx2-main/WinRing0x64.sys
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
testx2-main/WinRing0x64.sys
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
testx2-main/xmrigDaemon.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
testx2-main/xmrigDaemon.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
testx2-main/xmrigMiner.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
testx2-main/xmrigMiner.exe
Resource
win10v2004-20240704-en
General
-
Target
testx2-main/xmrigDaemon.exe
-
Size
362KB
-
MD5
b16954807827ccfa1e4738fce1089b62
-
SHA1
b2f6607d68e4d197892c515b16b3f61252304120
-
SHA256
2f8c68901f8df6f67796a8a892dd517c2011b93f271da04ed55448e9686ad984
-
SHA512
48726f50886b81a08317a0db0171ae3264880d43514086766e3f9a354b59101cf0755f8d815ad6979eab8c7fcc62969ff977ed9d780f30323f6143697869c0ed
-
SSDEEP
6144:eluUm0Yxw8f9ZzJ83K1woh8iMFJrCK1vHkk:eIUmXw29EYwoip
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4960 xmrigMiner.exe Token: SeLockMemoryPrivilege 4960 xmrigMiner.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4960 xmrigMiner.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 872 wrote to memory of 1256 872 xmrigDaemon.exe 85 PID 872 wrote to memory of 1256 872 xmrigDaemon.exe 85 PID 1256 wrote to memory of 4960 1256 cmd.exe 86 PID 1256 wrote to memory of 4960 1256 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigDaemon.exe"C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigDaemon.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exe" --daemonized2⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exeC:\Users\Admin\AppData\Local\Temp\testx2-main\xmrigMiner.exe --daemonized3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4960
-
-