Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
Mineralbeta.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Mineralbeta.exe
Resource
win10v2004-20240709-en
General
-
Target
Mineralbeta.exe
-
Size
787KB
-
MD5
2b8184c9f54622a72211d4c17dba88d5
-
SHA1
644e3e459e12d86e932f2e7a96fe98ae0d0fa547
-
SHA256
195faded7aeb9b795f55063d2f83d1d429938ecd14a8bf10c39b6d07c202c6a7
-
SHA512
18b3e8d2628c1fb468b761bb099f9cc38c709dc05121ebb2275ec2670c0b05aa858fdb39f4104615cb7d8635068bf24965064f966955a50a8d7c216ba71b0b8f
-
SSDEEP
12288:5M1mdfEgLo2HAy4A456SoHlMj5I8TFy2dsFCHtBtoi12U0:5M1md8g8gAyjSoHlMj5noa1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation Mineralbeta.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 raw.githubusercontent.com 5 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4572 Mineralbeta.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4572 Mineralbeta.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 2396 4572 Mineralbeta.exe 90 PID 4572 wrote to memory of 2396 4572 Mineralbeta.exe 90 PID 4572 wrote to memory of 2396 4572 Mineralbeta.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mineralbeta.exe"C:\Users\Admin\AppData\Local\Temp\Mineralbeta.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Mineral\Mineral\launch.bat" "2⤵PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477B
MD513ba2be2636882312380d87e22959102
SHA1c6ad5df4513f277d463add4bf136850df3537008
SHA2562dbb9d91fff0ed3121794d1a7b423e71acde26d08699dcfa9cab2e9a09524398
SHA5123a79a0657411497e7c58be42976318f3779231e0515e6cbbc9782333968c40bc8de25df18c94e3174790d3300b8ef55fec7c9c05e1267f0914522b0940dc9f15