Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/09/2024, 18:26 UTC

240901-w3a8yaybmj 10

01/09/2024, 18:26 UTC

240901-w3ameayblr 10

01/09/2024, 18:26 UTC

240901-w291wayblq 10

01/09/2024, 18:26 UTC

240901-w27kraybln 10

01/09/2024, 18:18 UTC

240901-wx1xeayela 10

01/09/2024, 18:12 UTC

240901-ws8fpaxgml 10

01/09/2024, 18:06 UTC

240901-wp8maaxfnq 10

Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/09/2024, 18:06 UTC

General

  • Target

    xmrig-6.22.0-gcc-win64 plus/11Kryptex-ETC-Rigel.bat

  • Size

    92B

  • MD5

    634f74bb86bbee797fb3fd78bb981c69

  • SHA1

    dacc178885db2349ad47b9e8d2fb6140dbb7ca61

  • SHA256

    4c42750d70f4097dd4de26367a7ee25704bca438e82476c4e9481246d067b632

  • SHA512

    07d76ed885fefa28765cfe3b6c42213fb43c6ec709a82aa7245c8896fe4e79b7d672fcf3043a658ed034e27449e9921f5120a911cb0a0ce8667d819e6d2720ef

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.0-gcc-win64 plus\11Kryptex-ETC-Rigel.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.0-gcc-win64 plus\xmrig.exe
      xmrig --coin XMR --url "xmr.kryptex.network:7777" --user "scallorphee@gmail.com/WORKER_NAME"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4572

Network

  • flag-us
    DNS
    xmr.kryptex.network
    xmrig.exe
    Remote address:
    8.8.8.8:53
    Request
    xmr.kryptex.network
    IN A
    Response
    xmr.kryptex.network
    IN A
    157.90.32.66
  • flag-us
    DNS
    66.32.90.157.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    66.32.90.157.in-addr.arpa
    IN PTR
    Response
    66.32.90.157.in-addr.arpa
    IN PTR
    static663290157clients your-serverde
  • flag-us
    DNS
    214.80.50.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    214.80.50.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    77.190.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    77.190.18.2.in-addr.arpa
    IN PTR
    Response
    77.190.18.2.in-addr.arpa
    IN PTR
    a2-18-190-77deploystaticakamaitechnologiescom
  • 157.90.32.66:7777
    xmr.kryptex.network
    xmrig.exe
    1.1kB
    1.5kB
    9
    8
  • 8.8.8.8:53
    xmr.kryptex.network
    dns
    xmrig.exe
    65 B
    81 B
    1
    1

    DNS Request

    xmr.kryptex.network

    DNS Response

    157.90.32.66

  • 8.8.8.8:53
    66.32.90.157.in-addr.arpa
    dns
    71 B
    127 B
    1
    1

    DNS Request

    66.32.90.157.in-addr.arpa

  • 8.8.8.8:53
    214.80.50.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    214.80.50.20.in-addr.arpa

  • 8.8.8.8:53
    77.190.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    77.190.18.2.in-addr.arpa

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4572-0-0x00000257A5780000-0x00000257A57A0000-memory.dmp

    Filesize

    128KB

  • memory/4572-1-0x00000257A7250000-0x00000257A7270000-memory.dmp

    Filesize

    128KB

  • memory/4572-2-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-3-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-4-0x00000257A7270000-0x00000257A7290000-memory.dmp

    Filesize

    128KB

  • memory/4572-5-0x00000257A7290000-0x00000257A72B0000-memory.dmp

    Filesize

    128KB

  • memory/4572-6-0x00000257A7270000-0x00000257A7290000-memory.dmp

    Filesize

    128KB

  • memory/4572-8-0x00000257A7290000-0x00000257A72B0000-memory.dmp

    Filesize

    128KB

  • memory/4572-7-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-9-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-10-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-11-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-12-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-13-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-14-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-15-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-16-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-17-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-18-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

  • memory/4572-19-0x00007FF741AB0000-0x00007FF7426E2000-memory.dmp

    Filesize

    12.2MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.