Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10ORIGIN BET...el.bat
windows10-1703-x64
10ORIGIN BET...el.bat
windows10-2004-x64
10ORIGIN BET...el.bat
windows11-21h2-x64
10ORIGIN BET...el.bat
windows10-1703-x64
10ORIGIN BET...el.bat
windows10-2004-x64
10ORIGIN BET...el.bat
windows11-21h2-x64
10ORIGIN BET...el.bat
windows10-1703-x64
10ORIGIN BET...el.bat
windows10-2004-x64
10ORIGIN BET...el.bat
windows11-21h2-x64
10Resubmissions
03/09/2024, 12:14 UTC
240903-pelw7sxeke 1003/09/2024, 12:12 UTC
240903-pdb1lswdjq 1003/09/2024, 12:11 UTC
240903-pck7wswcrm 1003/09/2024, 08:42 UTC
240903-kl4clsscqq 1003/09/2024, 08:41 UTC
240903-klrzkstckc 1003/09/2024, 08:41 UTC
240903-klkv9sscnn 1003/09/2024, 08:40 UTC
240903-klbycstcjd 1003/09/2024, 08:40 UTC
240903-kk236atcja 1003/09/2024, 08:40 UTC
240903-kktrsatbrg 10Analysis
-
max time kernel
1794s -
max time network
1799s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 08:40 UTC
Behavioral task
behavioral1
Sample
ORIGIN BETA/1Kryptex-ETC-Rigel.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
ORIGIN BETA/1Kryptex-ETC-Rigel.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ORIGIN BETA/1Kryptex-ETC-Rigel.bat
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
ORIGIN BETA/2Kryptex-ETC-Rigel.bat
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
ORIGIN BETA/2Kryptex-ETC-Rigel.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
ORIGIN BETA/2Kryptex-ETC-Rigel.bat
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
ORIGIN BETA/Kryptex-ETC-Rigel.bat
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
ORIGIN BETA/Kryptex-ETC-Rigel.bat
Resource
win10v2004-20240802-en
General
-
Target
ORIGIN BETA/1Kryptex-ETC-Rigel.bat
-
Size
92B
-
MD5
634f74bb86bbee797fb3fd78bb981c69
-
SHA1
dacc178885db2349ad47b9e8d2fb6140dbb7ca61
-
SHA256
4c42750d70f4097dd4de26367a7ee25704bca438e82476c4e9481246d067b632
-
SHA512
07d76ed885fefa28765cfe3b6c42213fb43c6ec709a82aa7245c8896fe4e79b7d672fcf3043a658ed034e27449e9921f5120a911cb0a0ce8667d819e6d2720ef
Malware Config
Signatures
-
XMRig Miner payload 63 IoCs
resource yara_rule behavioral2/memory/2864-2-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-5-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-8-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-9-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-10-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-11-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-12-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-13-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-14-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-15-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-16-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-17-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-18-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-19-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-20-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-21-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-22-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-23-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-24-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-25-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-26-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-27-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-28-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-29-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-30-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-31-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-32-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-33-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-34-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-35-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-36-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-37-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-38-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-39-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-40-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-41-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-42-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-43-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-44-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-45-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-46-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-47-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-48-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-49-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-50-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-51-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-52-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-53-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-54-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-55-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-56-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-57-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-58-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-59-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-60-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-61-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-62-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-63-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-64-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-65-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-66-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-67-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig behavioral2/memory/2864-68-0x00007FF6607E0000-0x00007FF661412000-memory.dmp xmrig -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2864 xmrig.exe Token: SeLockMemoryPrivilege 2864 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 xmrig.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2864 2032 cmd.exe 91 PID 2032 wrote to memory of 2864 2032 cmd.exe 91
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ORIGIN BETA\1Kryptex-ETC-Rigel.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\ORIGIN BETA\xmrig.exexmrig --coin XMR --url "xmr.kryptex.network:7777" --user "scallorphee@gmail.com/WORKER_NAME"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3804,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=4248 /prefetch:81⤵PID:840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4100,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=2748 /prefetch:81⤵PID:2152
Network
-
Remote address:8.8.8.8:53Requestxmr.kryptex.networkIN AResponsexmr.kryptex.networkIN A157.90.32.66
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestsettings-win.data.microsoft.comIN AResponsesettings-win.data.microsoft.comIN CNAMEatm-settingsfe-prod-geo2.trafficmanager.netatm-settingsfe-prod-geo2.trafficmanager.netIN CNAMEsettings-prod-wus2-2.westus2.cloudapp.azure.comsettings-prod-wus2-2.westus2.cloudapp.azure.comIN A20.72.205.209
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request81.144.22.2.in-addr.arpaIN PTRResponse81.144.22.2.in-addr.arpaIN PTRa2-22-144-81deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request66.32.90.157.in-addr.arpaIN PTRResponse66.32.90.157.in-addr.arpaIN PTRstatic663290157clientsyour-serverde
-
Remote address:8.8.8.8:53Request23.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request107.12.20.2.in-addr.arpaIN PTRResponse107.12.20.2.in-addr.arpaIN PTRa2-20-12-107deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request195.201.50.20.in-addr.arpaIN PTRResponse
-
65 B 81 B 1 1
DNS Request
xmr.kryptex.network
DNS Response
157.90.32.66
-
143 B 298 B 2 2
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
settings-win.data.microsoft.com
DNS Response
20.72.205.209
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
81.144.22.2.in-addr.arpa
-
71 B 127 B 1 1
DNS Request
66.32.90.157.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
107.12.20.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.236.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
195.201.50.20.in-addr.arpa