Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 16:17

General

  • Target

    Mineralbeta.exe

  • Size

    787KB

  • MD5

    2b8184c9f54622a72211d4c17dba88d5

  • SHA1

    644e3e459e12d86e932f2e7a96fe98ae0d0fa547

  • SHA256

    195faded7aeb9b795f55063d2f83d1d429938ecd14a8bf10c39b6d07c202c6a7

  • SHA512

    18b3e8d2628c1fb468b761bb099f9cc38c709dc05121ebb2275ec2670c0b05aa858fdb39f4104615cb7d8635068bf24965064f966955a50a8d7c216ba71b0b8f

  • SSDEEP

    12288:5M1mdfEgLo2HAy4A456SoHlMj5I8TFy2dsFCHtBtoi12U0:5M1md8g8gAyjSoHlMj5noa1

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Mineralbeta.exe
    "C:\Users\Admin\AppData\Local\Temp\Mineralbeta.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Mineral\Mineral\launch.bat" "
      2⤵
        PID:2396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Mineral\Mineral\launch.bat

      Filesize

      477B

      MD5

      13ba2be2636882312380d87e22959102

      SHA1

      c6ad5df4513f277d463add4bf136850df3537008

      SHA256

      2dbb9d91fff0ed3121794d1a7b423e71acde26d08699dcfa9cab2e9a09524398

      SHA512

      3a79a0657411497e7c58be42976318f3779231e0515e6cbbc9782333968c40bc8de25df18c94e3174790d3300b8ef55fec7c9c05e1267f0914522b0940dc9f15

    • memory/4572-0-0x0000000074C7E000-0x0000000074C7F000-memory.dmp

      Filesize

      4KB

    • memory/4572-1-0x0000000000B50000-0x0000000000C1A000-memory.dmp

      Filesize

      808KB

    • memory/4572-2-0x0000000074C70000-0x0000000075420000-memory.dmp

      Filesize

      7.7MB

    • memory/4572-3-0x0000000005FC0000-0x0000000005FE2000-memory.dmp

      Filesize

      136KB

    • memory/4572-4-0x0000000005FF0000-0x0000000006344000-memory.dmp

      Filesize

      3.3MB

    • memory/4572-7-0x0000000006540000-0x000000000654A000-memory.dmp

      Filesize

      40KB

    • memory/4572-8-0x0000000006570000-0x0000000006582000-memory.dmp

      Filesize

      72KB

    • memory/4572-80-0x0000000074C70000-0x0000000075420000-memory.dmp

      Filesize

      7.7MB