Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    2432s
  • max time network
    2651s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/08/2024, 06:09

General

  • Target

    VMiner.exe

  • Size

    6.9MB

  • MD5

    cc81947de225d6961ae90929830442fe

  • SHA1

    31c2ae3d0fc6b218a896c278b33471558a9690a5

  • SHA256

    1e830a7cd4a3cd3129996ed9f65bcb2046cf8183278628a990cdb859dc8cf1cb

  • SHA512

    9a88ec1fb0bfc2531341054fef5c31aa47c9775f034cef352b0b8f9470968b5756757c65d7888855907c43e8c4259d3bc5586514e2031a8a8704d52b7349fb61

  • SSDEEP

    98304:zKOWhECzMM3tGfREhv5LeY2dtF8IAPBQbWaotGFqcu54waSDr:eBnzftGqhEzdT0P08tGAP546Dr

Score
10/10

Malware Config

Signatures

  • XMRig Miner payload 2 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VMiner.exe
    "C:\Users\Admin\AppData\Local\Temp\VMiner.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3848
    • C:\Windows\system32\cmd.exe
      cmd /C start C:\Users\Admin\AppData\Roaming\vminer\start.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\vminer\start.cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:420
        • C:\Users\Admin\AppData\Roaming\vminer\xmrig.exe
          xmrig.exe -o xmrig.sd1.rostech.dev:6164 -u 43EiyU9JorPM6YbxLNZ3ehSxpZszgQkwmhRdLBKhG1SnjeHWz2uKpokUqR5b9T6wKrWrGb5vMmGMq1UV4845ZYsQLau19bV -p VMiner -k
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\vminer\start.cmd

    Filesize

    186B

    MD5

    56ba23eefeefff219fba1d22fb439f8f

    SHA1

    b87106bad5e5c44b2316f43b160b8b63a0d39131

    SHA256

    8d546397cfccd5b4cbffa0711605718413502123ab7471c861cb0cc233891fe3

    SHA512

    ac4709d89c457f6f25665d5a346f7df73a02f9ac2afdf0f0c6da1ef8bbd3a43cba9ca824877860da50f728a9810a50c1e54eea8269d6634b794b70969c05775b

  • C:\Users\Admin\AppData\Roaming\vminer\xmrig.exe

    Filesize

    6.1MB

    MD5

    5fba8ae226b096da3b31de0e17496735

    SHA1

    d532a01254cf9e0229d3c5803b78ff7c9b0cb8d3

    SHA256

    ca28f4aeaa5e16d216cd828b67454a56f3c7feeb242412d26ed914fadff20d40

    SHA512

    951e44fc0864a6741bcbb4227feb5429a032713dabd91102f4f0e27a69181ce7f23562e902cc09896ae26334b6d18caf0f5a13d81370bd703fd7ed6f78b47e72

  • memory/2768-13-0x000002B48CFA0000-0x000002B48CFC0000-memory.dmp

    Filesize

    128KB

  • memory/2768-14-0x000002B48CFF0000-0x000002B48D010000-memory.dmp

    Filesize

    128KB

  • memory/2768-15-0x000002B48D020000-0x000002B48D040000-memory.dmp

    Filesize

    128KB

  • memory/2768-16-0x000002B48D040000-0x000002B48D060000-memory.dmp

    Filesize

    128KB

  • memory/2768-17-0x000002B48D020000-0x000002B48D040000-memory.dmp

    Filesize

    128KB

  • memory/2768-18-0x000002B48D040000-0x000002B48D060000-memory.dmp

    Filesize

    128KB