Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...2).bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...3).bat
windows11-21h2-x64
10TEST POP/S...4).bat
windows11-21h2-x64
10TEST POP/S...2).bat
windows11-21h2-x64
10TEST POP/S...3).bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...ro.bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...2).bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...3).bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...4).bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...2).bat
windows11-21h2-x64
10TEST POP/S...3).bat
windows11-21h2-x64
10TEST POP/S...2).bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...um.bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...2).bat
windows11-21h2-x64
10TEST POP/S...ie.bat
windows11-21h2-x64
10TEST POP/S...3).bat
windows11-21h2-x64
10Resubmissions
01/10/2024, 19:23 UTC
241001-x3szeszekf 1023/09/2024, 10:45 UTC
240923-mteqbsvdkj 1022/09/2024, 13:14 UTC
240922-qgq5da1flh 1022/09/2024, 13:13 UTC
240922-qgf96s1eml 1022/09/2024, 13:12 UTC
240922-qfysts1fjb 1022/09/2024, 13:12 UTC
240922-qfsa2s1erd 1022/09/2024, 11:50 UTC
240922-nzne4aybjf 1022/09/2024, 11:50 UTC
240922-nzmtkaxhrr 1022/09/2024, 11:50 UTC
240922-nzlw9sxhrp 1022/09/2024, 11:49 UTC
240922-nzfegsxhqr 10Analysis
-
max time kernel
290s -
max time network
306s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/09/2024, 11:49 UTC
Behavioral task
behavioral1
Sample
TEST POP/Start-Monero - Copie (2) - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
TEST POP/Start-Monero - Copie (2).bat
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
TEST POP/Start-Monero - Copie (3) - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
TEST POP/Start-Monero - Copie (3).bat
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
TEST POP/Start-Monero - Copie (4).bat
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
TEST POP/Start-Monero - Copie - Copie (2).bat
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
TEST POP/Start-Monero - Copie - Copie (3).bat
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
TEST POP/Start-Monero - Copie - Copie - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
TEST POP/Start-Monero - Copie - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
TEST POP/Start-Monero - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
TEST POP/Start-Monero.bat
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
TEST POP/Start-Salvium - Copie (2) - Copie - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
TEST POP/Start-Salvium - Copie (2) - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
TEST POP/Start-Salvium - Copie (2).bat
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
TEST POP/Start-Salvium - Copie (3) - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
TEST POP/Start-Salvium - Copie (3).bat
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
TEST POP/Start-Salvium - Copie (4) - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
TEST POP/Start-Salvium - Copie (4).bat
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
TEST POP/Start-Salvium - Copie - Copie (2) - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
TEST POP/Start-Salvium - Copie - Copie (2).bat
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
TEST POP/Start-Salvium - Copie - Copie (3).bat
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
TEST POP/Start-Salvium - Copie - Copie - Copie (2).bat
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
TEST POP/Start-Salvium - Copie - Copie - Copie - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
TEST POP/Start-Salvium - Copie - Copie - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
TEST POP/Start-Salvium - Copie - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
TEST POP/Start-Salvium - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
TEST POP/Start-Salvium.bat
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
TEST POP/Start-Zephyr - Copie (2) - Copie - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
TEST POP/Start-Zephyr - Copie (2) - Copie.bat
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
TEST POP/Start-Zephyr - Copie (2).bat
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
TEST POP/Start-Zephyr - Copie (3) - Copie.bat
Resource
win11-20240802-en
General
-
Target
TEST POP/Start-Monero - Copie (2) - Copie.bat
-
Size
105B
-
MD5
94f509728ba74ed638dc087d0e9130cd
-
SHA1
e8ae09cdc5ae390b0b8e9f071bce1c0bf888ab01
-
SHA256
ca6f6d968bb34080f34c84a81bc7c1dd0b3976577752e2a50cf2f4ee48cf1cf2
-
SHA512
94a466db3b011c0bf0c844fc27cfdb914f2d29b930c75a80b73681661c00ae3a7183ec2be82f1c7f7f70239f35406289a00df4f3b756d99c905baff629214e37
Malware Config
Signatures
-
XMRig Miner payload 29 IoCs
resource yara_rule behavioral1/memory/3004-2-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-3-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-8-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-9-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-10-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-11-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-12-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-13-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-14-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-15-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-16-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-17-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-18-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-19-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-20-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-21-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-22-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-23-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-24-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-25-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-26-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-27-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-28-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-29-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-30-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-31-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-32-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-33-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig behavioral1/memory/3004-34-0x00007FF6AC3E0000-0x00007FF6AD012000-memory.dmp xmrig -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 3004 xmrig.exe Token: SeLockMemoryPrivilege 3004 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 xmrig.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3360 wrote to memory of 3004 3360 cmd.exe 79 PID 3360 wrote to memory of 3004 3360 cmd.exe 79
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\TEST POP\Start-Monero - Copie (2) - Copie.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\TEST POP\xmrig.exexmrig.exe --coin XMR --url "xmr.kryptex.network:7777" --user scallorphee@gmail.com -p x -k2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3004
-
Network
-
Remote address:8.8.8.8:53Requestxmr.kryptex.networkIN AResponsexmr.kryptex.networkIN A157.90.32.66
-
Remote address:8.8.8.8:53Request66.32.90.157.in-addr.arpaIN PTRResponse66.32.90.157.in-addr.arpaIN PTRstatic663290157clientsyour-serverde
-
Remote address:8.8.8.8:53Requestnexusrules.officeapps.live.comIN AResponsenexusrules.officeapps.live.comIN CNAMEprod.nexusrules.live.com.akadns.netprod.nexusrules.live.com.akadns.netIN A52.111.229.19
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestself.events.data.microsoft.comIN AResponseself.events.data.microsoft.comIN CNAMEself-events-data.trafficmanager.netself-events-data.trafficmanager.netIN CNAMEonedscolprdeus07.eastus.cloudapp.azure.comonedscolprdeus07.eastus.cloudapp.azure.comIN A52.168.117.168
-
Remote address:8.8.8.8:53Request168.117.168.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEctldl.windowsupdate.com.delivery.microsoft.comctldl.windowsupdate.com.delivery.microsoft.comIN CNAMEwu-b-net.trafficmanager.netwu-b-net.trafficmanager.netIN CNAMEwu.azureedge.netwu.azureedge.netIN CNAMEwu.ec.azureedge.netwu.ec.azureedge.netIN CNAMEbg.apr-52dd2-0503.edgecastdns.netbg.apr-52dd2-0503.edgecastdns.netIN CNAMEhlb.apr-52dd2-0.edgecastdns.nethlb.apr-52dd2-0.edgecastdns.netIN CNAMEcs11.wpc.v0cdn.netcs11.wpc.v0cdn.netIN A93.184.221.240
-
Remote address:8.8.8.8:53Requestocsp.digicert.comIN AResponseocsp.digicert.comIN CNAMEocsp.edge.digicert.comocsp.edge.digicert.comIN CNAMEfp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.2be4.phicdn.netIN CNAMEfp2e7a.wpc.phicdn.netfp2e7a.wpc.phicdn.netIN A192.229.221.95
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
638 B 1.5kB 9 9
DNS Request
xmr.kryptex.network
DNS Response
157.90.32.66
DNS Request
66.32.90.157.in-addr.arpa
DNS Request
nexusrules.officeapps.live.com
DNS Response
52.111.229.19
DNS Request
19.229.111.52.in-addr.arpa
DNS Request
self.events.data.microsoft.com
DNS Response
52.168.117.168
DNS Request
168.117.168.52.in-addr.arpa
DNS Request
ctldl.windowsupdate.com
DNS Response
93.184.221.240
DNS Request
ocsp.digicert.com
DNS Response
192.229.221.95
DNS Request
240.221.184.93.in-addr.arpa