Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
15/07/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
cada3e288c060cfdbf02ba7862856e75ae80da25628847ab61ca88742b4e56b9.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cada3e288c060cfdbf02ba7862856e75ae80da25628847ab61ca88742b4e56b9.exe
Resource
win10-20240611-en
General
-
Target
cada3e288c060cfdbf02ba7862856e75ae80da25628847ab61ca88742b4e56b9.exe
-
Size
4.2MB
-
MD5
ec65a98577fe1efb547b7e62e52e71b6
-
SHA1
dc25d5b63597fbe49c89c3b21a21facd5fa2d5fc
-
SHA256
cada3e288c060cfdbf02ba7862856e75ae80da25628847ab61ca88742b4e56b9
-
SHA512
3082ca0dc0ac1d59ab86a371cacad53c99c979487c895eeba2d2bcb66c05ea6933cce1917bb7fe08906a4ac0c267eda2375cf940d6220b8819dbbedea50be1bc
-
SSDEEP
98304:kq5rst/26xqh6dyuuLy1rBuAY7bk6hVbCoBpYTVpAJbcTf:kqBsAPhW3uL8BubY6hooD4pAJb
Malware Config
Extracted
loaderbot
https://ct45361.tw1.ru/cmd.php
Signatures
-
LoaderBot executable 2 IoCs
resource yara_rule behavioral2/files/0x000700000001aada-52.dat loaderbot behavioral2/memory/4420-55-0x0000000000780000-0x0000000000B7E000-memory.dmp loaderbot -
XMRig Miner payload 30 IoCs
resource yara_rule behavioral2/memory/220-65-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/220-66-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/220-67-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/220-68-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/220-69-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/220-71-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4380-74-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4380-75-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4380-76-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5036-79-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5036-80-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5036-81-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3824-84-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3824-85-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3824-86-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3824-87-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3824-88-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3824-89-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3824-90-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4376-93-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4376-94-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4376-95-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4376-96-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4376-97-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4376-98-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4376-99-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4376-100-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4376-101-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4376-102-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/4376-103-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url Installer.exe -
Executes dropped EXE 12 IoCs
pid Process 820 7z.exe 5108 7z.exe 4440 7z.exe 64 7z.exe 2796 7z.exe 164 7z.exe 4420 Installer.exe 220 Driver.exe 4380 Driver.exe 5036 Driver.exe 3824 Driver.exe 4376 Driver.exe -
Loads dropped DLL 6 IoCs
pid Process 820 7z.exe 5108 7z.exe 4440 7z.exe 64 7z.exe 2796 7z.exe 164 7z.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\Installer.exe" Installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe 4420 Installer.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeRestorePrivilege 820 7z.exe Token: 35 820 7z.exe Token: SeSecurityPrivilege 820 7z.exe Token: SeSecurityPrivilege 820 7z.exe Token: SeRestorePrivilege 5108 7z.exe Token: 35 5108 7z.exe Token: SeSecurityPrivilege 5108 7z.exe Token: SeSecurityPrivilege 5108 7z.exe Token: SeRestorePrivilege 4440 7z.exe Token: 35 4440 7z.exe Token: SeSecurityPrivilege 4440 7z.exe Token: SeSecurityPrivilege 4440 7z.exe Token: SeRestorePrivilege 64 7z.exe Token: 35 64 7z.exe Token: SeSecurityPrivilege 64 7z.exe Token: SeSecurityPrivilege 64 7z.exe Token: SeRestorePrivilege 2796 7z.exe Token: 35 2796 7z.exe Token: SeSecurityPrivilege 2796 7z.exe Token: SeSecurityPrivilege 2796 7z.exe Token: SeRestorePrivilege 164 7z.exe Token: 35 164 7z.exe Token: SeSecurityPrivilege 164 7z.exe Token: SeSecurityPrivilege 164 7z.exe Token: SeDebugPrivilege 4420 Installer.exe Token: SeLockMemoryPrivilege 220 Driver.exe Token: SeLockMemoryPrivilege 220 Driver.exe Token: SeLockMemoryPrivilege 4380 Driver.exe Token: SeLockMemoryPrivilege 4380 Driver.exe Token: SeLockMemoryPrivilege 5036 Driver.exe Token: SeLockMemoryPrivilege 5036 Driver.exe Token: SeLockMemoryPrivilege 3824 Driver.exe Token: SeLockMemoryPrivilege 3824 Driver.exe Token: SeLockMemoryPrivilege 4376 Driver.exe Token: SeLockMemoryPrivilege 4376 Driver.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1384 wrote to memory of 3968 1384 cada3e288c060cfdbf02ba7862856e75ae80da25628847ab61ca88742b4e56b9.exe 70 PID 1384 wrote to memory of 3968 1384 cada3e288c060cfdbf02ba7862856e75ae80da25628847ab61ca88742b4e56b9.exe 70 PID 3968 wrote to memory of 1004 3968 cmd.exe 72 PID 3968 wrote to memory of 1004 3968 cmd.exe 72 PID 3968 wrote to memory of 820 3968 cmd.exe 73 PID 3968 wrote to memory of 820 3968 cmd.exe 73 PID 3968 wrote to memory of 5108 3968 cmd.exe 74 PID 3968 wrote to memory of 5108 3968 cmd.exe 74 PID 3968 wrote to memory of 4440 3968 cmd.exe 75 PID 3968 wrote to memory of 4440 3968 cmd.exe 75 PID 3968 wrote to memory of 64 3968 cmd.exe 76 PID 3968 wrote to memory of 64 3968 cmd.exe 76 PID 3968 wrote to memory of 2796 3968 cmd.exe 77 PID 3968 wrote to memory of 2796 3968 cmd.exe 77 PID 3968 wrote to memory of 164 3968 cmd.exe 78 PID 3968 wrote to memory of 164 3968 cmd.exe 78 PID 3968 wrote to memory of 4756 3968 cmd.exe 79 PID 3968 wrote to memory of 4756 3968 cmd.exe 79 PID 3968 wrote to memory of 4420 3968 cmd.exe 80 PID 3968 wrote to memory of 4420 3968 cmd.exe 80 PID 3968 wrote to memory of 4420 3968 cmd.exe 80 PID 4420 wrote to memory of 220 4420 Installer.exe 82 PID 4420 wrote to memory of 220 4420 Installer.exe 82 PID 4420 wrote to memory of 4380 4420 Installer.exe 86 PID 4420 wrote to memory of 4380 4420 Installer.exe 86 PID 4420 wrote to memory of 5036 4420 Installer.exe 88 PID 4420 wrote to memory of 5036 4420 Installer.exe 88 PID 4420 wrote to memory of 3824 4420 Installer.exe 90 PID 4420 wrote to memory of 3824 4420 Installer.exe 90 PID 4420 wrote to memory of 4376 4420 Installer.exe 93 PID 4420 wrote to memory of 4376 4420 Installer.exe 93 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4756 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cada3e288c060cfdbf02ba7862856e75ae80da25628847ab61ca88742b4e56b9.exe"C:\Users\Admin\AppData\Local\Temp\cada3e288c060cfdbf02ba7862856e75ae80da25628847ab61ca88742b4e56b9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"2⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\system32\mode.commode 65,103⤵PID:1004
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p177329647297291883199214736 -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:164
-
-
C:\Windows\system32\attrib.exeattrib +H "Installer.exe"3⤵
- Views/modifies file attributes
PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\main\Installer.exe"Installer.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 8AjRQPGQfFaMQL4ZNtmz6fSqpNdYZhUVsJxcZC7uiYmi1L5vQpeQr4nGu433wELAERYfH6BsSVBgKSnZcCdKHeYr4Cpj4ja -p x -k -v=0 --donate-level=1 -t 44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 8AjRQPGQfFaMQL4ZNtmz6fSqpNdYZhUVsJxcZC7uiYmi1L5vQpeQr4nGu433wELAERYfH6BsSVBgKSnZcCdKHeYr4Cpj4ja -p x -k -v=0 --donate-level=1 -t 44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 8AjRQPGQfFaMQL4ZNtmz6fSqpNdYZhUVsJxcZC7uiYmi1L5vQpeQr4nGu433wELAERYfH6BsSVBgKSnZcCdKHeYr4Cpj4ja -p x -k -v=0 --donate-level=1 -t 44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 8AjRQPGQfFaMQL4ZNtmz6fSqpNdYZhUVsJxcZC7uiYmi1L5vQpeQr4nGu433wELAERYfH6BsSVBgKSnZcCdKHeYr4Cpj4ja -p x -k -v=0 --donate-level=1 -t 44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 8AjRQPGQfFaMQL4ZNtmz6fSqpNdYZhUVsJxcZC7uiYmi1L5vQpeQr4nGu433wELAERYfH6BsSVBgKSnZcCdKHeYr4Cpj4ja -p x -k -v=0 --donate-level=1 -t 44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
2.2MB
MD52dd896e0a861617e38de37daf1e6b1da
SHA1a46fa8572d4ad1270589751a0b058b8fc8937541
SHA2561e7f8b4aad2fc79ff0d6c2cdb58dcca6300553f1591cdd4da84375790d719792
SHA5121c84cfd77b0cb2c7bf0c0ec2d0795d289549d88a59e9cd6b04957ec0a96289b8014fbfd805083f5578625f58fc552ce04257e08056726b2165e84fd3c12b860d
-
Filesize
4.0MB
MD5fd58cb30a2bcb91e173119504090d901
SHA1581b555164f35397e9907b582fb6aa7f13c114c7
SHA2562225cb35cdfa4da78b8fd62ea94c7aee3a374c20deac430ed9bc487f916ae274
SHA512b0746c8b80e285bae5049100842c0fa670aa575c7a121f8bd33c475e973905784e1e817c0c653de10b75a46ee6ca722fb1a0582dbce573aa132e8754955a30c1
-
Filesize
1.7MB
MD55a7a86ac92fadc6b2c4ac348d4a476a5
SHA19ac57d59446eba28adc43fcc6e4d288814d07904
SHA2569b94af357b358e53becf5ca5efa57279d09f2f035c12a0b47b88909530306fe3
SHA5125419c9720f547ef6c0270c59c6b5b5300d33f3550ed49fde4ebd38cc5faf98037a7a4d7e943fc7db1d77ff5f7c4a768a86e385ce5e9bf026f2e1c8e8aca48eb8
-
Filesize
1.7MB
MD549756f4c168817ca2ff7da479904830d
SHA145ec80d62c1a13cec6c6017e5ebef64796089ed5
SHA2563552130a00a388c94d533addf308765e736731d5c70479171f2810368fd39bbe
SHA512a08a25dc62a5a589898ea0d8b9906d6c0ea6617f81c2f4b8e8c688c53bbb317eeca620f56635fabedf7a776dffe862807db3cb6ab5d69884c9e00a21200fffa8
-
Filesize
1.7MB
MD5f0fa87d69fa4fc6350b87842cfcc230c
SHA17d218179b37c1cd1922015d26221d673908c6b80
SHA2566513a434133a0e8256c763ac9f4f3bf6f3b0a0870b28c511aa7058e50c7516ba
SHA5128e0add1083b00351091e656cf12bbaf6bfc643b89afd0824ce26956774b9a4b4f36a892e4b7986f09687e098bde980bc5a8548c854b75576b47abcf07a2683f6
-
Filesize
1.7MB
MD58c29a86951e06ded8f158a49e22c0aa2
SHA158c1df0615df978cc19620e785324e14c5732857
SHA25642bd3131fb621e1a371d7af071e84e5f2d011ca61f7e58eac52824d52022ab9d
SHA512f21d12154154268e0850b29e65c403688bcadc759bd5ff58ffb83fdf64856da9e4964f3a3116cea109fab38269d485882a509a7ef4144c9834ee029bcdfbea55
-
Filesize
3.3MB
MD50308cf60e717a3063ca7445a30255eb5
SHA13890bcb68cecf35dbaf9957e739e16efce005b72
SHA256afca704f58766e697fd0d316bddba6bef0ba9a5d81318a25c6e67bc181d1d082
SHA5123f57d00396bc9e27b1949fe4256010d9eed6e0ac492fe7b54ca9162c309209c7506e2403a1265278c7c0c66960fb0be9b6ed229e48d462c2d55dbffa017962c7
-
Filesize
3.3MB
MD5bdc897346d8a044deb4ac2463f229355
SHA10b3038a96ae1c91540ba3fd567e757d497b50401
SHA2567fc65fc4794e2dfb8e36db71df4e4b4a77d39d46a6e8b0ebd83d4f6dbb90a4bd
SHA512095bd7c21ca1c0266e0b3606c4e87878fca59a8a7ea79b63be93e2f5e42199f1dcb0496b7e112ed2a8c37177e64230a5ab29b00338e81cbd3267b6ea1a266d07
-
Filesize
473B
MD5947a718853f2f09f121101d6f2453100
SHA16fd4186cfe03e87de8aa09b257bcc152263253cc
SHA256ab6c8d4d99bf162ce3aa87599b0c911cc22357b7df252658ad27fdf958e6e224
SHA512aea13e2b5d730c24fb70d3484bcc102a0a16038926914c1e039e390812eb5715d47d96487c231f1d442fa7e739f8c183db81d3396a077075dfe41b23f045d3e4
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322