Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    41s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 05:50 UTC

General

  • Target

    85d243c292ebf254df203628c73a9a73264fd949cc28e26c0037f8cf12683ff1.exe

  • Size

    5.6MB

  • MD5

    6bb97b906229cc6468d201836c757e60

  • SHA1

    473144794e11eebdd2e0dd375c47079e7ebb2c0c

  • SHA256

    85d243c292ebf254df203628c73a9a73264fd949cc28e26c0037f8cf12683ff1

  • SHA512

    1c8a6079e6ecf19b04e8f178032820751e6edcb2708ce79774515e429ac41eacf77d676a0464784c9e53be87301933e04c7779064d4a50bf51e5b6f6f7a354fe

  • SSDEEP

    98304:xRjPz9KDzUU8O5/B/LJ25E9SVh86sS3TRknQ3ss2MApp9meypA3cPDu7y:xFKoU8O5/b2XViSjX310SeyGc7u7y

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 8 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Stops running service(s) 4 TTPs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85d243c292ebf254df203628c73a9a73264fd949cc28e26c0037f8cf12683ff1.exe
    "C:\Users\Admin\AppData\Local\Temp\85d243c292ebf254df203628c73a9a73264fd949cc28e26c0037f8cf12683ff1.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2232
    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2372
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\system32\wusa.exe
        wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
        • Drops file in Windows directory
        PID:2724
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop UsoSvc
      2⤵
      • Launches sc.exe
      PID:2784
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop WaaSMedicSvc
      2⤵
      • Launches sc.exe
      PID:3044
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop wuauserv
      2⤵
      • Launches sc.exe
      PID:2832
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop bits
      2⤵
      • Launches sc.exe
      PID:744
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop dosvc
      2⤵
      • Launches sc.exe
      PID:2928
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:2740
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:2736
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:2616
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:2624
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe delete "JIOGRCSG"
      2⤵
      • Launches sc.exe
      PID:1908
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe create "JIOGRCSG" binpath= "C:\ProgramData\zvycwxhpsxqt\lutlgidagtja.exe" start= "auto"
      2⤵
      • Launches sc.exe
      PID:624
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop eventlog
      2⤵
      • Launches sc.exe
      PID:2636
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start "JIOGRCSG"
      2⤵
      • Launches sc.exe
      PID:2036
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\85d243c292ebf254df203628c73a9a73264fd949cc28e26c0037f8cf12683ff1.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\system32\choice.exe
        choice /C Y /N /D Y /T 3
        3⤵
          PID:1612
    • C:\ProgramData\zvycwxhpsxqt\lutlgidagtja.exe
      C:\ProgramData\zvycwxhpsxqt\lutlgidagtja.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2896
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1736
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          3⤵
          • Drops file in Windows directory
          PID:2396
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop UsoSvc
        2⤵
        • Launches sc.exe
        PID:1308
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop WaaSMedicSvc
        2⤵
        • Launches sc.exe
        PID:1996
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop wuauserv
        2⤵
        • Launches sc.exe
        PID:1424
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop bits
        2⤵
        • Launches sc.exe
        PID:2996
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop dosvc
        2⤵
        • Launches sc.exe
        PID:2968
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1304
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1688
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2380
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2212
      • C:\Windows\system32\conhost.exe
        C:\Windows\system32\conhost.exe
        2⤵
          PID:1964
        • C:\Windows\system32\nslookup.exe
          nslookup.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2012

      Network

      • flag-us
        DNS
        us-zephyr.miningocean.org
        nslookup.exe
        Remote address:
        8.8.8.8:53
        Request
        us-zephyr.miningocean.org
        IN A
        Response
        us-zephyr.miningocean.org
        IN A
        15.204.240.197
        us-zephyr.miningocean.org
        IN A
        15.204.244.104
      • 15.204.240.197:5432
        us-zephyr.miningocean.org
        tls
        nslookup.exe
        1.4kB
        6.3kB
        9
        10
      • 8.8.8.8:53
        us-zephyr.miningocean.org
        dns
        nslookup.exe
        71 B
        103 B
        1
        1

        DNS Request

        us-zephyr.miningocean.org

        DNS Response

        15.204.240.197
        15.204.244.104

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \ProgramData\zvycwxhpsxqt\lutlgidagtja.exe

        Filesize

        5.6MB

        MD5

        6bb97b906229cc6468d201836c757e60

        SHA1

        473144794e11eebdd2e0dd375c47079e7ebb2c0c

        SHA256

        85d243c292ebf254df203628c73a9a73264fd949cc28e26c0037f8cf12683ff1

        SHA512

        1c8a6079e6ecf19b04e8f178032820751e6edcb2708ce79774515e429ac41eacf77d676a0464784c9e53be87301933e04c7779064d4a50bf51e5b6f6f7a354fe

      • memory/1964-20-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/1964-26-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/1964-21-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/1964-22-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/1964-23-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/1964-19-0x0000000140000000-0x000000014000E000-memory.dmp

        Filesize

        56KB

      • memory/2012-32-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-39-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-42-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-30-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-37-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-38-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-29-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-33-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-35-0x00000000002F0000-0x0000000000310000-memory.dmp

        Filesize

        128KB

      • memory/2012-34-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-36-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-40-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-31-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2012-28-0x0000000140000000-0x0000000140848000-memory.dmp

        Filesize

        8.3MB

      • memory/2372-6-0x0000000001E30000-0x0000000001E38000-memory.dmp

        Filesize

        32KB

      • memory/2372-7-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

        Filesize

        9.6MB

      • memory/2372-8-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

        Filesize

        9.6MB

      • memory/2372-4-0x000007FEF5D2E000-0x000007FEF5D2F000-memory.dmp

        Filesize

        4KB

      • memory/2372-10-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

        Filesize

        9.6MB

      • memory/2372-12-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

        Filesize

        9.6MB

      • memory/2372-9-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

        Filesize

        9.6MB

      • memory/2372-5-0x000000001B670000-0x000000001B952000-memory.dmp

        Filesize

        2.9MB

      • memory/2372-11-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

        Filesize

        9.6MB

      • memory/2896-18-0x00000000009A0000-0x00000000009A8000-memory.dmp

        Filesize

        32KB

      • memory/2896-17-0x0000000019FD0000-0x000000001A2B2000-memory.dmp

        Filesize

        2.9MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.