Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 18:23

General

  • Target

    419f4b2b780057cb6244ed20ccf34817473c21becf8e21d2f3ade6d8c63d298b.exe

  • Size

    4.2MB

  • MD5

    3c02e253cd5d0bc84a853ffdf58a5c34

  • SHA1

    4d084c1090bab0b90da2c49dcacdd7731aaf69b2

  • SHA256

    419f4b2b780057cb6244ed20ccf34817473c21becf8e21d2f3ade6d8c63d298b

  • SHA512

    f2572eef44aeba80938f8634145e674883bd78e56a16ab68c95120a8627c290849e853247b2be4dd46ae02864b6137f529ad940530fb32ae27c2dcabc981827b

  • SSDEEP

    98304:YO54BDQcY+IuJ9ESlMidCVhvFutGhvIs6q32hTk7NzwLLZ/:YONcYmEpMGBX2ho7JwR/

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • LoaderBot executable 2 IoCs
  • XMRig Miner payload 16 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\419f4b2b780057cb6244ed20ccf34817473c21becf8e21d2f3ade6d8c63d298b.exe
    "C:\Users\Admin\AppData\Local\Temp\419f4b2b780057cb6244ed20ccf34817473c21becf8e21d2f3ade6d8c63d298b.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Windows\system32\mode.com
        mode 65,10
        3⤵
          PID:4704
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e file.zip -p45081553117849290061075124205 -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4352
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_10.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3532
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_9.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4992
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_8.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2928
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_7.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:572
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_6.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3100
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_5.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4464
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_4.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1412
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_3.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1448
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_2.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:740
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_1.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1076
        • C:\Windows\system32\attrib.exe
          attrib +H "Installer.exe"
          3⤵
          • Views/modifies file attributes
          PID:4928
        • C:\Users\Admin\AppData\Local\Temp\main\Installer.exe
          "Installer.exe"
          3⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2964
          • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
            "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 41wJSADBgtMYhLGiEm4cGn7Nto2pWgVbMS14myvSGXFRBhSxmZ2MauKLWBU1enJXVkiNHuZBEZuhaRnWoqEfh7r74f72bYr -p x -k -v=0 --donate-level=1 -t 4
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4520
          • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
            "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 41wJSADBgtMYhLGiEm4cGn7Nto2pWgVbMS14myvSGXFRBhSxmZ2MauKLWBU1enJXVkiNHuZBEZuhaRnWoqEfh7r74f72bYr -p x -k -v=0 --donate-level=1 -t 4
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3468

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\Installer.exe

      Filesize

      4.0MB

      MD5

      8fccb79bcb06003b60601a384a350791

      SHA1

      f119fd4eb8e10640493c55e90b3213705affca30

      SHA256

      2c97296ca64dbd00ae6b4eafd79a941a490ef55ccf7f37f6f56758d851a5deaa

      SHA512

      6cd32193d086e5b4a122581472103b03b2f446803874c53b2d1a0d7af7d768805de1bf65a8e526c963064fb1bdab1508cfc4d0607dc276375c6d760fb1448a4c

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

      Filesize

      2.2MB

      MD5

      9363d761301d80d565ffbce3cc921ba7

      SHA1

      9573a2ae1f86eff5a47a081d8bacfd5f0bdd433a

      SHA256

      cc4df854bd1e7defb4bae3d41df8e9f00da706803441e45bf0a3989d0230c3fc

      SHA512

      32a208d1101214894cac47e48972b3a2c6c6fc5e5a02e0a4184ec44edf22cd9e5a828e4a91bf2f38e56097982b4076d3f0ec3e26f415199ebde59a3f068f3e40

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

      Filesize

      1.7MB

      MD5

      4754d233b18e373b5a84bb52d00858c4

      SHA1

      adbe686706364fab4ddf08f30d0c5f3451a97310

      SHA256

      dbf520a71d00bac68a8b66bec1ce7a7f8739ad62138d1628c802a937b2310f9d

      SHA512

      bb0e5469685932b9025f8eb05187f68d7bf450cc75fb6b9b5b655daaf132086489c6f4c6002c6cc6ea411a51f700b514a8cb7d96c6a90d6a8768781f58e58c17

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_10.zip

      Filesize

      3.3MB

      MD5

      0f888fcdee20318bfafa87d4ed9614e7

      SHA1

      fb136df5fc80b42f815a52b4d38df96e2c979577

      SHA256

      64e59dc1a6554f825a808eacf56c9974ee386a1b4eeba67459a9e3c3940c1499

      SHA512

      00ce05809f1504a70f45170f63e0fcd495518b2971474f82e7c5637bffd6efa19eac6f486c2cf320ea572165d64ab2c280ea617b0744e6a209e1053ce9995add

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

      Filesize

      1.7MB

      MD5

      d93a6500c7adcce87940fa7b7e08ef4c

      SHA1

      d8436d8101ba1e88830cf93be1e294375a0c3b40

      SHA256

      7bb441c57e7e02964a2c6ae4a7794a0f70e3f8886fc4651e40c86d41e3035d64

      SHA512

      c4b50f250bf86eadb6a409633df351b8acdc7306e5a0ec0f97df9e126f4e0b771bd635edfe48bf0367a1f442468325cb8e78bde57b1bf0fb18f998e52fe6ecb2

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

      Filesize

      1.7MB

      MD5

      b95b63135cbc23df2202d7b0ae9dcf73

      SHA1

      c30c4dd25cd9b7c67216bf20373fa36f4780d0ef

      SHA256

      d36336338ca84d550d6ef645afe0f7df6d06b370fc311bd45bf67e257477c6c3

      SHA512

      fb722790099161fa2352b6adfe56dadd881db95054879a06d85e8ccc2e7a16a493a744a860527a4f8f5007c1af10d6e4e3a24243acf810fe5332ad827c9a00f4

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

      Filesize

      1.7MB

      MD5

      6b92793f70c4fec7bbaa87a7e27d1975

      SHA1

      661ed2dea701e3ebbebad4c431ffe0014b7656e4

      SHA256

      6b84546095e746191c5b6a96162660499db33793cc5c84b0684f2e18f25701ae

      SHA512

      09b32982c4e58f64563285dfe3cca69f59b0333a6c42d4f458f1e3f242901e18537492f2803bccdbc4aa1b91d25add1a32a59f23ec32bc932812142c16d37e1e

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

      Filesize

      1.7MB

      MD5

      a5803fb3d2ceee689857494e3344f147

      SHA1

      b56242544915edbcca7fa7218e66b41a08ed780b

      SHA256

      e6e902368e8ac779f872d7ec6a4e6482440628d1934101d8af13d6d8ea6c2af5

      SHA512

      dc22c3b3614df1d38ebaba82b5da2bb227d05ba058d44be36fd955a06d827b25eefb9054566808059304439d7062e0a89865d113f5784009a62aef5a97142edb

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

      Filesize

      1.7MB

      MD5

      e1ca00199af73eb7c92a6d285a38df94

      SHA1

      a07d906e2418f495ef16b4b5fe094069736b62a7

      SHA256

      3dbf34f3fb41fef41dbcfb3a76a3725fc3f3d3b55e01c3c9026a8032ae7a8a6d

      SHA512

      701135487028a4ba239ecdd7ab1fc8fbd8a62157da252ae9e009fa0650e2841ce663360fd833dc0cb09537938faa43bf718d7a361d5cee489da4b9c71800ee6b

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

      Filesize

      1.7MB

      MD5

      c54768f8f4d8b521244a12db1aa816a3

      SHA1

      8b569ecdad19db61a661dd166f8f328f0e49a6c5

      SHA256

      b8fd5dc4698c6a15fec672755f285f19116a22c0888f722339a1ceb38c91567d

      SHA512

      75a06670a70d319d70df1126d53c1dcf84eb34ac6ca59af680c4c843ba22fe79bdcfc2849beca984a67b0a9b67a8dfb71ca2f1abf1a5b1293bc6d4b5cf157e9f

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_8.zip

      Filesize

      1.7MB

      MD5

      ecd26534a3b2d00a2805dbc251f55c1d

      SHA1

      aedf5572f7e6b4d6f7cd8e98b058e5df9785c19f

      SHA256

      ebada5524ac3da53327668ae4921306c58d41db2d17a889ea428b3f3cca2cf88

      SHA512

      2a33099680baa717019bc8eed89949c9e087a1cf3f1b50056d256650fab3363aaf7efe6e8715059d2399025c8101f22b41e3e1f288c44827dae9d9aa21c9a300

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_9.zip

      Filesize

      1.7MB

      MD5

      4c3edc337b556855c8b64bd4435d2810

      SHA1

      a5ef8a3566c026c346f910c07b6a8fc3f5115b9b

      SHA256

      4a2a7792c1727d07fb72a41054c3f74e9a743e2a6f5776292cac0aacff60b107

      SHA512

      49b96b86f834edaa0423ccfdca31e42f3c7cb15aef84cde9844512d84c6a294e3f9519fb5a1192f1716b8c236a75315e7af4ecdbcca299c39ac0c5c49fef7f57

    • C:\Users\Admin\AppData\Local\Temp\main\file.bin

      Filesize

      3.3MB

      MD5

      20fdcfaf0306917d21ba3b7e26154b3b

      SHA1

      ec0e89fce7494826adc971232d6d68d1923dad6a

      SHA256

      677974fd3c8f865800896b4742d4135e6968a0500fbd13aa70c5cab86c42ca03

      SHA512

      a02bc71b4fb7152c5cdc19fa928a6d817eaa7dee29bb3bef0f791c04170fd2fb1486bc5325810d9fd23f78259b3fa3a89d32184bf6f6b18c1afd0065def3cd00

    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

      Filesize

      476B

      MD5

      4c5f950ef7656023b3f17d1b0eab088e

      SHA1

      25ef9c5fe93cd48a94af1d91b418914b46dcbb81

      SHA256

      bd386aaa62ff3fea8b8fdc39309a931c506f1dc6dd7cb1ece5d7e716e7b2add7

      SHA512

      e5c3646abc0e4c16738a340cde978608210c8ecae4682570f1d72a829b2e74a36e72181838bd71025fd587c591e0cb9d8e7d5f4d6ff508ccd1ac843b2371a9cd

    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

      Filesize

      3.9MB

      MD5

      02569a7a91a71133d4a1023bf32aa6f4

      SHA1

      0f16bcb3f3f085d3d3be912195558e9f9680d574

      SHA256

      8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

      SHA512

      534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

    • memory/2964-88-0x00000000053C0000-0x0000000005426000-memory.dmp

      Filesize

      408KB

    • memory/2964-85-0x0000000000300000-0x00000000006FE000-memory.dmp

      Filesize

      4.0MB

    • memory/3468-109-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-110-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-118-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-104-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-105-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-106-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-107-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-108-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-117-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-116-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-111-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-112-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-113-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-114-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/3468-115-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4520-99-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB

    • memory/4520-100-0x0000000000460000-0x0000000000474000-memory.dmp

      Filesize

      80KB

    • memory/4520-101-0x0000000140000000-0x0000000140B75000-memory.dmp

      Filesize

      11.5MB