Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/12/2024, 06:31 UTC

General

  • Target

    52ccb18907989061a005a218de1b80cb6f5bfea40526285d68756259c8864116.exe

  • Size

    5.6MB

  • MD5

    76bd8ca947af2d287bd93650157955f3

  • SHA1

    baca932048d593fc574374441a820544576f05eb

  • SHA256

    52ccb18907989061a005a218de1b80cb6f5bfea40526285d68756259c8864116

  • SHA512

    cfc492417ca38b88b3c9347dcbf071f6daec67d72dcd6b2cd670a32927f374979aecf928daad21129f271de0659aa60eea380aea9bc0d5c6f69755e7d4b8abdb

  • SSDEEP

    98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/H9:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgR

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 11 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 1 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52ccb18907989061a005a218de1b80cb6f5bfea40526285d68756259c8864116.exe
    "C:\Users\Admin\AppData\Local\Temp\52ccb18907989061a005a218de1b80cb6f5bfea40526285d68756259c8864116.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1680
    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2420
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Windows\system32\wusa.exe
        wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
          PID:2740
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop UsoSvc
        2⤵
        • Launches sc.exe
        PID:1960
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop WaaSMedicSvc
        2⤵
        • Launches sc.exe
        PID:1188
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop wuauserv
        2⤵
        • Launches sc.exe
        PID:1768
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop bits
        2⤵
        • Launches sc.exe
        PID:3704
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop dosvc
        2⤵
        • Launches sc.exe
        PID:764
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:976
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:3384
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:5032
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2656
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe delete "JVNIRHNX"
        2⤵
        • Launches sc.exe
        PID:392
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe create "JVNIRHNX" binpath= "C:\ProgramData\xhzmmmxzrrwn\fqwofdtexigy.exe" start= "auto"
        2⤵
        • Launches sc.exe
        PID:1584
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop eventlog
        2⤵
        • Launches sc.exe
        PID:3108
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start "JVNIRHNX"
        2⤵
        • Launches sc.exe
        PID:3912
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\52ccb18907989061a005a218de1b80cb6f5bfea40526285d68756259c8864116.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4220
        • C:\Windows\system32\choice.exe
          choice /C Y /N /D Y /T 3
          3⤵
            PID:4224
      • C:\ProgramData\xhzmmmxzrrwn\fqwofdtexigy.exe
        C:\ProgramData\xhzmmmxzrrwn\fqwofdtexigy.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4412
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3588
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4952
          • C:\Windows\system32\wusa.exe
            wusa /uninstall /kb:890830 /quiet /norestart
            3⤵
              PID:1940
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop UsoSvc
            2⤵
            • Launches sc.exe
            PID:1912
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop WaaSMedicSvc
            2⤵
            • Launches sc.exe
            PID:3044
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop wuauserv
            2⤵
            • Launches sc.exe
            PID:4032
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop bits
            2⤵
            • Launches sc.exe
            PID:2736
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop dosvc
            2⤵
            • Launches sc.exe
            PID:3156
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:4300
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:1640
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:4456
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:3960
          • C:\Windows\system32\conhost.exe
            C:\Windows\system32\conhost.exe
            2⤵
              PID:2588
            • C:\Windows\system32\nslookup.exe
              nslookup.exe
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:640

          Network

          • flag-us
            DNS
            154.239.44.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            154.239.44.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            95.221.229.192.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            95.221.229.192.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            76.32.126.40.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            76.32.126.40.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            97.17.167.52.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            97.17.167.52.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            us-zephyr.miningocean.org
            nslookup.exe
            Remote address:
            8.8.8.8:53
            Request
            us-zephyr.miningocean.org
            IN A
            Response
            us-zephyr.miningocean.org
            IN A
            15.204.240.197
            us-zephyr.miningocean.org
            IN A
            15.204.244.104
          • flag-us
            DNS
            197.240.204.15.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            197.240.204.15.in-addr.arpa
            IN PTR
            Response
            197.240.204.15.in-addr.arpa
            IN PTR
            vps-0a583ba3vpsovhus
          • flag-us
            DNS
            56.163.245.4.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            56.163.245.4.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            206.23.85.13.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            206.23.85.13.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            181.129.81.91.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            181.129.81.91.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            172.214.232.199.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            172.214.232.199.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            30.243.111.52.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            30.243.111.52.in-addr.arpa
            IN PTR
            Response
          • 15.204.240.197:5432
            us-zephyr.miningocean.org
            tls
            nslookup.exe
            2.3kB
            6.8kB
            15
            16
          • 8.8.8.8:53
            154.239.44.20.in-addr.arpa
            dns
            72 B
            158 B
            1
            1

            DNS Request

            154.239.44.20.in-addr.arpa

          • 8.8.8.8:53
            95.221.229.192.in-addr.arpa
            dns
            73 B
            144 B
            1
            1

            DNS Request

            95.221.229.192.in-addr.arpa

          • 8.8.8.8:53
            76.32.126.40.in-addr.arpa
            dns
            71 B
            157 B
            1
            1

            DNS Request

            76.32.126.40.in-addr.arpa

          • 8.8.8.8:53
            97.17.167.52.in-addr.arpa
            dns
            71 B
            145 B
            1
            1

            DNS Request

            97.17.167.52.in-addr.arpa

          • 8.8.8.8:53
            us-zephyr.miningocean.org
            dns
            nslookup.exe
            71 B
            103 B
            1
            1

            DNS Request

            us-zephyr.miningocean.org

            DNS Response

            15.204.240.197
            15.204.244.104

          • 8.8.8.8:53
            197.240.204.15.in-addr.arpa
            dns
            73 B
            110 B
            1
            1

            DNS Request

            197.240.204.15.in-addr.arpa

          • 8.8.8.8:53
            56.163.245.4.in-addr.arpa
            dns
            71 B
            157 B
            1
            1

            DNS Request

            56.163.245.4.in-addr.arpa

          • 8.8.8.8:53
            206.23.85.13.in-addr.arpa
            dns
            71 B
            145 B
            1
            1

            DNS Request

            206.23.85.13.in-addr.arpa

          • 8.8.8.8:53
            181.129.81.91.in-addr.arpa
            dns
            72 B
            147 B
            1
            1

            DNS Request

            181.129.81.91.in-addr.arpa

          • 8.8.8.8:53
            172.214.232.199.in-addr.arpa
            dns
            74 B
            128 B
            1
            1

            DNS Request

            172.214.232.199.in-addr.arpa

          • 8.8.8.8:53
            30.243.111.52.in-addr.arpa
            dns
            72 B
            158 B
            1
            1

            DNS Request

            30.243.111.52.in-addr.arpa

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\xhzmmmxzrrwn\fqwofdtexigy.exe

            Filesize

            5.6MB

            MD5

            76bd8ca947af2d287bd93650157955f3

            SHA1

            baca932048d593fc574374441a820544576f05eb

            SHA256

            52ccb18907989061a005a218de1b80cb6f5bfea40526285d68756259c8864116

            SHA512

            cfc492417ca38b88b3c9347dcbf071f6daec67d72dcd6b2cd670a32927f374979aecf928daad21129f271de0659aa60eea380aea9bc0d5c6f69755e7d4b8abdb

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bpvdukqn.d3d.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/640-56-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-58-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-59-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-57-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-65-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-72-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-73-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-71-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-70-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-61-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-67-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-60-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-68-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-63-0x00000182CDF10000-0x00000182CDF30000-memory.dmp

            Filesize

            128KB

          • memory/640-64-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-62-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/640-66-0x0000000140000000-0x0000000140848000-memory.dmp

            Filesize

            8.3MB

          • memory/2420-0-0x00007FF8DED23000-0x00007FF8DED25000-memory.dmp

            Filesize

            8KB

          • memory/2420-11-0x00007FF8DED20000-0x00007FF8DF7E1000-memory.dmp

            Filesize

            10.8MB

          • memory/2420-1-0x0000028E5A0C0000-0x0000028E5A0E2000-memory.dmp

            Filesize

            136KB

          • memory/2420-15-0x00007FF8DED20000-0x00007FF8DF7E1000-memory.dmp

            Filesize

            10.8MB

          • memory/2420-12-0x00007FF8DED20000-0x00007FF8DF7E1000-memory.dmp

            Filesize

            10.8MB

          • memory/2588-55-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/2588-48-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/2588-49-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/2588-51-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/2588-52-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/2588-50-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/3588-45-0x000002AC2DC90000-0x000002AC2DC9A000-memory.dmp

            Filesize

            40KB

          • memory/3588-44-0x000002AC2DC80000-0x000002AC2DC86000-memory.dmp

            Filesize

            24KB

          • memory/3588-43-0x000002AC2DC50000-0x000002AC2DC58000-memory.dmp

            Filesize

            32KB

          • memory/3588-42-0x000002AC2DCA0000-0x000002AC2DCBA000-memory.dmp

            Filesize

            104KB

          • memory/3588-41-0x000002AC2DC40000-0x000002AC2DC4A000-memory.dmp

            Filesize

            40KB

          • memory/3588-40-0x000002AC2DC60000-0x000002AC2DC7C000-memory.dmp

            Filesize

            112KB

          • memory/3588-39-0x000002AC2B550000-0x000002AC2B55A000-memory.dmp

            Filesize

            40KB

          • memory/3588-38-0x000002AC2DA40000-0x000002AC2DAF5000-memory.dmp

            Filesize

            724KB

          • memory/3588-37-0x000002AC2DA20000-0x000002AC2DA3C000-memory.dmp

            Filesize

            112KB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.