Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/08/2024, 02:27

General

  • Target

    81d7d198766e05c765cc4814cb3db8e3.exe

  • Size

    18KB

  • MD5

    81d7d198766e05c765cc4814cb3db8e3

  • SHA1

    24f4bf8122663db5fd7ef441e5d963c657de81c1

  • SHA256

    7ef0dbe74ba624afab311c9dcb533bf6faccd794ce5c824d4f734d11b7dd9c3d

  • SHA512

    2c166b96a65482fb2aabdac3ee3de99d7264cd179f11788692f6fe43256561228764e9129b4f230b0a084339ff3805421a14d1dcf96a7ea4a2531ee41bffc3c1

  • SSDEEP

    384:elK/PKenMK6H1/UhTzCp4JyPzZhAuYqH8JEwEj/GrKwtgG/Xi/GlNEplhrrFcckQ:dKKf6V4veyX1ayIq1c

Malware Config

Signatures

  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • XMRig Miner payload 14 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81d7d198766e05c765cc4814cb3db8e3.exe
    "C:\Users\Admin\AppData\Local\Temp\81d7d198766e05c765cc4814cb3db8e3.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3752
    • C:\Users\Admin\AppData\Local\Temp\GameProcessHelper.exe
      "C:\Users\Admin\AppData\Local\Temp\GameProcessHelper.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4716
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5104
    • C:\Users\Admin\AppData\Local\Temp\OmegaOmega.exe
      "C:\Users\Admin\AppData\Local\Temp\OmegaOmega.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Users\Admin\AppData\Roaming\Windows Media\OmegaOmega.exe
        "C:\Users\Admin\AppData\Roaming\Windows Media\OmegaOmega.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Users\Admin\AppData\Roaming\Windows Media\01100011 01110000 01110101\xmrig.exe
          "C:\Users\Admin\AppData\Roaming\Windows Media\01100011 01110000 01110101\xmrig.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OmegaOmega.exe.log

    Filesize

    942B

    MD5

    6bdda504525dab642f6b2501909f5db9

    SHA1

    4ee3f943422d4ab46886aad80c0aebdf231a0426

    SHA256

    c295416053705f71b5287254d10d37efcbce5a07deda8785b1e5fc0985eeb00c

    SHA512

    c5ad8170c259ccd214cc43d759620b87e43f6dba8e0ff0a4f9ae2f3a962cec33d57f93f0514603ecde3809c882cc7f3be525e5e3c05bd9f2532acf11b2ee76b4

  • C:\Users\Admin\AppData\Local\Temp\GameProcessHelper.exe

    Filesize

    14KB

    MD5

    b63f1761996a673dc4ac26af70886e38

    SHA1

    44b4943cf03e249b6f6e203d7f036571d8809d74

    SHA256

    088b1532727ab21a9e22b04f610305999d197afa5dbe17446f4e2a996ffc836a

    SHA512

    351ab37b75e2c84ed7a149c7a40aa8b1d1c54acb20789abe4ed2617d1dc451b4d95200cf9b1e3c9a1a5c219f043602674f9fc6ad780d03c2535933df34d28f32

  • C:\Users\Admin\AppData\Local\Temp\OmegaOmega.exe

    Filesize

    14KB

    MD5

    c85b809746b4014d0c3bab307457a682

    SHA1

    fd8e16b9a623d1c7be174f0443ba6ec02af946ef

    SHA256

    3d5d031286fea012a784fc3ae8e4f3227b4b74e57d8b33324608f5d9cc487f19

    SHA512

    a4828e2395526ea2eed02e3badfe3175155efde3c76823946042cdc7ecaadaf62361e17f56f95fb8e0001f2723b0e1fbb85bb85e609f125b21daa9ac707b172e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2ctfcohc.kmx.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Windows Media\01100011 01110000 01110101\config.json

    Filesize

    374B

    MD5

    a81505bbd0055ce9bda43cae27082a96

    SHA1

    07a3e93db7dfe28e962369a1102daabcb2040369

    SHA256

    7cca9027b06a2ef1c6679d616d74a50be2089c2e53190c806df8adebfc4a137a

    SHA512

    1d51ba72cc3d86eae01bf7a8097c9a537eb8e1b5263f1755c839dd856bff646337ff3accf43055d5598ff485c176546351937800320c43944bcf60f7fd513355

  • C:\Users\Admin\AppData\Roaming\Windows Media\01100011 01110000 01110101\xmrig.exe

    Filesize

    6.9MB

    MD5

    061df86f0d1cdf06e773594385661f6b

    SHA1

    39ea13d5df4a9ed12eddfc50386f05d46abfe703

    SHA256

    4d378e530f50238ac45aff750b63e8dbe0dfac89a051e4cfb1aef7513076fdd0

    SHA512

    9fb523f4b7776a7aee79d7a7758708caff82e24b77ebbe1951622ed2227770a68f5ec9ff1eb21d8322c39ce9948b975bc0bec97c4fa334116893aae4a5ebcf74

  • C:\Users\Admin\AppData\Roaming\Windows Media\sample.txt

    Filesize

    50B

    MD5

    eb66e6a1bbe7fc49252cbbb8a19b6cdf

    SHA1

    437b804962bd8b51b6ccd7f535e35641f8531061

    SHA256

    c2b0f9bd5970fd525aaac069ddf2d00825544b547c9f7c8e941b9155d4bcd051

    SHA512

    3b92f734e517ec0434711d118d09f618e9db2dfb0155fafbb1bc4529d3e8e472b2c1040fd8a00da712fb65064df3ee7e2406ae7e3bac8554ec3105caac3cc16e

  • memory/2164-136-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2164-133-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2164-127-0x00000000001E0000-0x00000000001F4000-memory.dmp

    Filesize

    80KB

  • memory/2164-141-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2164-140-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2164-139-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2164-138-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2164-137-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2164-130-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2164-131-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2164-132-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2164-135-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2164-134-0x0000000000400000-0x0000000000E04000-memory.dmp

    Filesize

    10.0MB

  • memory/2284-88-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/3752-4-0x0000000005230000-0x000000000523A000-memory.dmp

    Filesize

    40KB

  • memory/3752-0-0x00000000752DE000-0x00000000752DF000-memory.dmp

    Filesize

    4KB

  • memory/3752-5-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/3752-104-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/3752-3-0x0000000005160000-0x00000000051F2000-memory.dmp

    Filesize

    584KB

  • memory/3752-2-0x0000000005800000-0x0000000005DA4000-memory.dmp

    Filesize

    5.6MB

  • memory/3752-6-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/3752-1-0x0000000000780000-0x000000000078A000-memory.dmp

    Filesize

    40KB

  • memory/3752-73-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/3752-72-0x00000000752DE000-0x00000000752DF000-memory.dmp

    Filesize

    4KB

  • memory/4716-71-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/4716-22-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/4716-21-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/5104-28-0x00000000058E0000-0x0000000005902000-memory.dmp

    Filesize

    136KB

  • memory/5104-65-0x0000000007D90000-0x0000000007DA4000-memory.dmp

    Filesize

    80KB

  • memory/5104-66-0x0000000007E90000-0x0000000007EAA000-memory.dmp

    Filesize

    104KB

  • memory/5104-67-0x0000000007E70000-0x0000000007E78000-memory.dmp

    Filesize

    32KB

  • memory/5104-69-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/5104-64-0x0000000007D80000-0x0000000007D8E000-memory.dmp

    Filesize

    56KB

  • memory/5104-63-0x0000000007D50000-0x0000000007D61000-memory.dmp

    Filesize

    68KB

  • memory/5104-62-0x0000000007DD0000-0x0000000007E66000-memory.dmp

    Filesize

    600KB

  • memory/5104-61-0x0000000007BC0000-0x0000000007BCA000-memory.dmp

    Filesize

    40KB

  • memory/5104-60-0x0000000007B50000-0x0000000007B6A000-memory.dmp

    Filesize

    104KB

  • memory/5104-59-0x0000000008190000-0x000000000880A000-memory.dmp

    Filesize

    6.5MB

  • memory/5104-58-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/5104-57-0x0000000007A20000-0x0000000007AC3000-memory.dmp

    Filesize

    652KB

  • memory/5104-56-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/5104-55-0x00000000079F0000-0x0000000007A0E000-memory.dmp

    Filesize

    120KB

  • memory/5104-44-0x000000006FC90000-0x000000006FCDC000-memory.dmp

    Filesize

    304KB

  • memory/5104-54-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/5104-43-0x0000000006E00000-0x0000000006E32000-memory.dmp

    Filesize

    200KB

  • memory/5104-42-0x0000000006860000-0x00000000068AC000-memory.dmp

    Filesize

    304KB

  • memory/5104-41-0x0000000006820000-0x000000000683E000-memory.dmp

    Filesize

    120KB

  • memory/5104-40-0x0000000006290000-0x00000000065E4000-memory.dmp

    Filesize

    3.3MB

  • memory/5104-30-0x0000000006220000-0x0000000006286000-memory.dmp

    Filesize

    408KB

  • memory/5104-29-0x0000000005A00000-0x0000000005A66000-memory.dmp

    Filesize

    408KB

  • memory/5104-27-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/5104-25-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB

  • memory/5104-26-0x0000000005A80000-0x00000000060A8000-memory.dmp

    Filesize

    6.2MB

  • memory/5104-24-0x0000000002F00000-0x0000000002F36000-memory.dmp

    Filesize

    216KB

  • memory/5104-23-0x00000000752D0000-0x0000000075A80000-memory.dmp

    Filesize

    7.7MB