Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1050cbb85b16...e6.exe
windows7-x64
1050cbb85b16...e6.exe
windows10-2004-x64
10$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$R9/uihost32.exe
windows7-x64
10$R9/uihost32.exe
windows10-2004-x64
10$R9/uihost64.exe
windows7-x64
10$R9/uihost64.exe
windows10-2004-x64
10Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/12/2024, 13:02
Behavioral task
behavioral1
Sample
50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$R9/uihost32.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$R9/uihost32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$R9/uihost64.exe
Resource
win7-20240903-en
General
-
Target
$R9/uihost32.exe
-
Size
3.3MB
-
MD5
4fca837855b3bced7559889adb41c4b7
-
SHA1
04efbfdfc154938b8b60ace4c2d75fae0afd788a
-
SHA256
8a366b1d30dd4d03ad8c5c18d0fb978d00d16f5f465bd59db6e09b034775c3ec
-
SHA512
9b9b5ce67d46acb33d800095c2dbd8e64c82612653c15053f099c06e6ef1f5ed3c1f2232e3608259fd406f1ac86f500f157a46ec15946de70407bab5554e92f9
-
SSDEEP
98304:JeMVCZJfIiM9zP7GAzjATtDJC0hNHY3RM:hCZfqzP7GAzjATtDJFN43m
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral5/memory/2924-0-0x0000000000400000-0x00000000007D4000-memory.dmp xmrig -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uihost32.exe