Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
gaozw40v.exe
Resource
win7-20240903-en
General
-
Target
gaozw40v.exe
-
Size
5.0MB
-
MD5
7d8f7b0c924a228c2ca81d3959d0b604
-
SHA1
972eae6c3f80dd0be06fb73bb64553cd10360873
-
SHA256
95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48
-
SHA512
6c5b93313fabc4bc0aab93da27bcbabb422fceef2bca9185d0cdc4e634240df9699b05389308e06ddedc604430a6c0164de8763b35d1268dce37e052c2c4bb81
-
SSDEEP
98304:VNvN3Y8Dz2X5ny7kOywy+VHoJzeDBuqgeYY8S91anzz9oq+T:FnaX5nfitVuzUBuDH88zpUT
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral2/memory/1612-20-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1612-19-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1612-23-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1612-22-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1612-21-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1612-17-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1612-16-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1612-24-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1384 bbwduuyjdzsp.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1384 set thread context of 1468 1384 bbwduuyjdzsp.exe 91 PID 1384 set thread context of 1612 1384 bbwduuyjdzsp.exe 92 -
resource yara_rule behavioral2/memory/1612-13-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-14-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-20-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-19-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-23-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-22-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-21-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-17-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-16-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-15-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-11-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-12-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1612-24-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4372 sc.exe 1116 sc.exe 2352 sc.exe 2064 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2640 gaozw40v.exe 2640 gaozw40v.exe 2640 gaozw40v.exe 2640 gaozw40v.exe 1384 bbwduuyjdzsp.exe 1384 bbwduuyjdzsp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 1612 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1468 1384 bbwduuyjdzsp.exe 91 PID 1384 wrote to memory of 1468 1384 bbwduuyjdzsp.exe 91 PID 1384 wrote to memory of 1468 1384 bbwduuyjdzsp.exe 91 PID 1384 wrote to memory of 1468 1384 bbwduuyjdzsp.exe 91 PID 1384 wrote to memory of 1468 1384 bbwduuyjdzsp.exe 91 PID 1384 wrote to memory of 1468 1384 bbwduuyjdzsp.exe 91 PID 1384 wrote to memory of 1468 1384 bbwduuyjdzsp.exe 91 PID 1384 wrote to memory of 1468 1384 bbwduuyjdzsp.exe 91 PID 1384 wrote to memory of 1468 1384 bbwduuyjdzsp.exe 91 PID 1384 wrote to memory of 1612 1384 bbwduuyjdzsp.exe 92 PID 1384 wrote to memory of 1612 1384 bbwduuyjdzsp.exe 92 PID 1384 wrote to memory of 1612 1384 bbwduuyjdzsp.exe 92 PID 1384 wrote to memory of 1612 1384 bbwduuyjdzsp.exe 92 PID 1384 wrote to memory of 1612 1384 bbwduuyjdzsp.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\gaozw40v.exe"C:\Users\Admin\AppData\Local\Temp\gaozw40v.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "YIFRWLJF"2⤵
- Launches sc.exe
PID:2064
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "YIFRWLJF" binpath= "C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe" start= "auto"2⤵
- Launches sc.exe
PID:2352
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:1116
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "YIFRWLJF"2⤵
- Launches sc.exe
PID:4372
-
-
C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exeC:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1468
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD57d8f7b0c924a228c2ca81d3959d0b604
SHA1972eae6c3f80dd0be06fb73bb64553cd10360873
SHA25695c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48
SHA5126c5b93313fabc4bc0aab93da27bcbabb422fceef2bca9185d0cdc4e634240df9699b05389308e06ddedc604430a6c0164de8763b35d1268dce37e052c2c4bb81