Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/12/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe
Resource
win7-20240903-en
General
-
Target
95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe
-
Size
5.0MB
-
MD5
7d8f7b0c924a228c2ca81d3959d0b604
-
SHA1
972eae6c3f80dd0be06fb73bb64553cd10360873
-
SHA256
95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48
-
SHA512
6c5b93313fabc4bc0aab93da27bcbabb422fceef2bca9185d0cdc4e634240df9699b05389308e06ddedc604430a6c0164de8763b35d1268dce37e052c2c4bb81
-
SSDEEP
98304:VNvN3Y8Dz2X5ny7kOywy+VHoJzeDBuqgeYY8S91anzz9oq+T:FnaX5nfitVuzUBuDH88zpUT
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2204-19-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2204-18-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2204-21-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2204-25-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2204-24-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2204-23-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2204-22-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2204-26-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 476 Process not Found 1604 bbwduuyjdzsp.exe -
Loads dropped DLL 1 IoCs
pid Process 476 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1604 set thread context of 2704 1604 bbwduuyjdzsp.exe 39 PID 1604 set thread context of 2204 1604 bbwduuyjdzsp.exe 40 -
resource yara_rule behavioral1/memory/2204-12-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-19-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-17-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-18-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-16-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-15-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-11-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-21-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-25-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-24-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-23-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-22-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2204-26-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2792 sc.exe 2804 sc.exe 2692 sc.exe 2740 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2648 95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe 2648 95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe 2648 95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe 2648 95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe 1604 bbwduuyjdzsp.exe 1604 bbwduuyjdzsp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 2204 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2704 1604 bbwduuyjdzsp.exe 39 PID 1604 wrote to memory of 2704 1604 bbwduuyjdzsp.exe 39 PID 1604 wrote to memory of 2704 1604 bbwduuyjdzsp.exe 39 PID 1604 wrote to memory of 2704 1604 bbwduuyjdzsp.exe 39 PID 1604 wrote to memory of 2704 1604 bbwduuyjdzsp.exe 39 PID 1604 wrote to memory of 2704 1604 bbwduuyjdzsp.exe 39 PID 1604 wrote to memory of 2704 1604 bbwduuyjdzsp.exe 39 PID 1604 wrote to memory of 2704 1604 bbwduuyjdzsp.exe 39 PID 1604 wrote to memory of 2704 1604 bbwduuyjdzsp.exe 39 PID 1604 wrote to memory of 2204 1604 bbwduuyjdzsp.exe 40 PID 1604 wrote to memory of 2204 1604 bbwduuyjdzsp.exe 40 PID 1604 wrote to memory of 2204 1604 bbwduuyjdzsp.exe 40 PID 1604 wrote to memory of 2204 1604 bbwduuyjdzsp.exe 40 PID 1604 wrote to memory of 2204 1604 bbwduuyjdzsp.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe"C:\Users\Admin\AppData\Local\Temp\95c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "YIFRWLJF"2⤵
- Launches sc.exe
PID:2740
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "YIFRWLJF" binpath= "C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe" start= "auto"2⤵
- Launches sc.exe
PID:2792
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2692
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "YIFRWLJF"2⤵
- Launches sc.exe
PID:2804
-
-
C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exeC:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2704
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD57d8f7b0c924a228c2ca81d3959d0b604
SHA1972eae6c3f80dd0be06fb73bb64553cd10360873
SHA25695c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48
SHA5126c5b93313fabc4bc0aab93da27bcbabb422fceef2bca9185d0cdc4e634240df9699b05389308e06ddedc604430a6c0164de8763b35d1268dce37e052c2c4bb81