Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2025, 17:46
Behavioral task
behavioral1
Sample
SheetRat.tar
Resource
win7-20240903-en
General
-
Target
SheetRat.tar
-
Size
102.6MB
-
MD5
94aafa0ee17be68beaecaae97228234d
-
SHA1
d45788aae967ca91a54fdf1f7d7503e318e1553f
-
SHA256
1c178d1f4290d4abc830797b690a00c038b4132ea1493ebbaf7bce85da7fc9d8
-
SHA512
ffd6108264f611480d551cc87bbc927897f5bc52d2628d3ca7064a4daf2a35ba3544f4a21c658d1781948d57d4bece39f7e0b6522630b2b3df64e69022d82a33
-
SSDEEP
1572864:/GvbzPJt+gDl2YY4vu0Wmkt9YpG3fLh5cXBgAUJBBmT8LySqAxKQ:/cmskt9YpG3fLh5cxgAUJBBmT8m8KQ
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023d7e-294.dat family_xmrig behavioral2/files/0x0007000000023d7e-294.dat xmrig -
Xmrig family
-
Executes dropped EXE 6 IoCs
pid Process 3876 ethminer.exe 4300 xmrminer.exe 1608 Client.exe 940 Server.exe 4272 Server.exe 3392 Server.exe -
Loads dropped DLL 30 IoCs
pid Process 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 4272 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe 3392 Server.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 216 940 WerFault.exe 117 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4480 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 4480 7zFM.exe Token: 35 4480 7zFM.exe Token: SeSecurityPrivilege 4480 7zFM.exe Token: SeSecurityPrivilege 4480 7zFM.exe Token: SeDebugPrivilege 4272 Server.exe Token: SeDebugPrivilege 3392 Server.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4480 7zFM.exe 4480 7zFM.exe 4480 7zFM.exe 4272 Server.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\SheetRat.tar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4480
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3192
-
C:\Users\Admin\Downloads\Stub\ethminer.exe"C:\Users\Admin\Downloads\Stub\ethminer.exe"1⤵
- Executes dropped EXE
PID:3876
-
C:\Users\Admin\Downloads\Stub\xmrminer.exe"C:\Users\Admin\Downloads\Stub\xmrminer.exe"1⤵
- Executes dropped EXE
PID:4300
-
C:\Users\Admin\Downloads\Stub\Client.exe"C:\Users\Admin\Downloads\Stub\Client.exe"1⤵
- Executes dropped EXE
PID:1608
-
C:\Users\Admin\Downloads\Confused\Server.exe"C:\Users\Admin\Downloads\Confused\Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 8962⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 940 -ip 9401⤵PID:3964
-
C:\Users\Admin\Downloads\Server.exe"C:\Users\Admin\Downloads\Server.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4272
-
C:\Users\Admin\Downloads\Server.exe"C:\Users\Admin\Downloads\Server.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD514393eb908e072fa3164597414bb0a75
SHA15e04e084ec44a0b29196d0c21213201240f11ba0
SHA25659b9d95ae42e35525fc63f93168fe304409463ee070a3cf21a427a2833564b80
SHA512f5fc3d9e98cca1fbbbe026707086a71f801016348d2355541d630879ad51a850f49eb4a5f7a94e12a844d7a7108d69fa6d762ee19f4805d6aafef16259b4330b
-
Filesize
32.2MB
MD5c1908aa6edfec3602b63e89905c888c4
SHA1aed61a7a8eada8ef92d91830802fb4ed5bd5e764
SHA256380d75309abcf9bd7e980b61c41f9262f56c242b4403e555dc2ad18cd310a036
SHA51299e1971093abca7124d214b6e6445ff5b6dcc6c7f2834fe4c5a4f99e0af0e71403b16c86e3c94b135f628e5632538b38c991a4af17601a9aee942348448a6acd
-
C:\Users\Admin\AppData\Local\GMap.NET\UrlCache\7A-37-FE-AF-96-76-33-1F-2C-6E-71-1B-6B-95-19-3C-D9-63-B4-06.txt
Filesize238KB
MD5b20409aed7813cf875d0d0011e891b93
SHA1f0bc068937e6a55edac1d83334b11e8602eaa051
SHA2562cbe36f805a903d3c5c6ccb988e1dafa9fe6b7b2cd5244c7fa8d3ef318fee5dc
SHA51232336efe4b27b491c6865d8a8f9ac51efaaa4426b4db19f1eec27e93a844da7e2548bb69addc98dadbbe3dcba6080fe1b413bdda8cb12bf1d314809eea3fbacb
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_phqh0gncdah5bxsyjvz4hnyzs52ccelo\1.0.0.0\1jnxouqs.newcfg
Filesize804B
MD564b487e656444f36f5d3d5e649ded5fe
SHA1c7c9c32f8a326adf0d89a094660b817d29525dfc
SHA256ac513ab0ab4ff39461b32df326286df46678d06a9cb02010921792f04351d1d4
SHA512187301a235720b32919dde3ac23f5d33b7d24124585cb26f0027d6b8cc329aa385b59301da663db5be26835c8f40940af3ced9c652dc08311d1dbb72b613b39b
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_phqh0gncdah5bxsyjvz4hnyzs52ccelo\1.0.0.0\user.config
Filesize311B
MD5a35bc67d130a4fb76c2c2831cbdddd55
SHA166502423bba03870522e50608212b6ee27ebf4c5
SHA256e94a97e512fbc8ed9f5691d921fdeddbff4cc16b024c5335adf66bff3a7a8192
SHA5124401b234d7914afa860e356be1667cc5f44402255f7cc6cc3d8df80883167f6b55463e62156df57be697ee501897fac61a71f97911c6fdb6630272341ac8a07e
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_phqh0gncdah5bxsyjvz4hnyzs52ccelo\1.0.0.0\user.config
Filesize561B
MD52e8ab7cdc2081c09a98f6c5593909409
SHA1282769c943f8ab0429315869466d042a99de95f4
SHA25617eee8708a1bbc35422e6ad9b6eff3bec4f8a8b8a87cce8e6cc0da2d94c9b3ae
SHA512b815e0deaea5348d5ec68cdba3e4b5018e6224299f170859181f90961831b7d14deda144b32d64b11f8da7f4cbdb0b86a8d253b0ee179df68baac274a363ef2a
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_phqh0gncdah5bxsyjvz4hnyzs52ccelo\1.0.0.0\user.config
Filesize434B
MD5cfcf8e91857f364e002065c52ff8f91c
SHA18407ecb3c33a1f3fcf18a723e6884acf7e5a0f4a
SHA256572dda8c7f211dc6a4efc7aecb4a54cb4e0ced1e4c9a4b9f96bb329c983c64e6
SHA512364fecac3a051441b4fefcebb2cc9e38632f99dd04593cd5d9b148986afb09b195e88cdbfa2e778b8934564b76d04fe053f919f0a60769b023f2f753ede06d1e
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_phqh0gncdah5bxsyjvz4hnyzs52ccelo\1.0.0.0\xo1eix0e.newcfg
Filesize687B
MD5b18785caae8834f89e34cde89b93cafc
SHA1cee194149b484295ddba88111a251986bdc0c7af
SHA256105971bbe15f24f50dad97d466b55222e52dfdb4a71b1b3a6452cfba28a10811
SHA512fb108e2997a0ea7bce21113118997f358d73a43a40e2b4b9962738cd88dc6d9dfc17e17e63c8ba8c5a5504e5775fbe9e8084ee8e6086cf0eab709335ed8b282c
-
Filesize
41KB
MD501a84fe18baf4f88a7dcab2798738079
SHA1255cdab958d769252ebdec6335e1f2b77788c8d2
SHA256f56dcd69405ba5873cee3fbabdc830b1f87853d1257048fe8cc0d0e30f83c2c7
SHA512921bb1dc8ffa71c54fe06e9c29b573f5a74e788f531fbd0d9104bdfc0f748dce7e7417e535d1b7d8a1cb222eda4faa3ed870573b545a545a3f40685fcd72b328
-
Filesize
1.8MB
MD52f4953747860b6b9f5e2d281ad7b33ed
SHA1b3c494f18efc33201bfeb70c46a20305e9e6a4c1
SHA256b497e24534343529d5393ebdbb2d9f7418ee984621a1ac17c61f6b69a19ea548
SHA512e64337f8cb3491b0962c9caa6a44fb6dbeb4d439b1ea9959475b85244537ada732a894199c77f56c92fa28f676ffac371c84769acdcac7400493f9042710c765
-
Filesize
2.9MB
MD5819352ea9e832d24fc4cebb2757a462b
SHA1aba7e1b29bdcd0c5a307087b55c2ec0c7ca81f11
SHA25658c755fcfc65cddea561023d736e8991f0ad69da5e1378dea59e98c5db901b86
SHA5126a5b0e1553616ea29ec72c12072ae05bdd709468a173e8adbdfe391b072c001ecacb3dd879845f8d599c6152eca2530cdaa2c069b1f94294f778158eaaebe45a
-
Filesize
147KB
MD532a8742009ffdfd68b46fe8fd4794386
SHA1de18190d77ae094b03d357abfa4a465058cd54e3
SHA256741e1a8f05863856a25d101bd35bf97cba0b637f0c04ecb432c1d85a78ef1365
SHA51222418d5e887a6022abe8a7cbb0b6917a7478d468d211eecd03a95b8fb6452fc59db5178573e25d5d449968ead26bb0b2bfbfada7043c9a7a1796baca5235a82b
-
Filesize
233B
MD5bb8d322795b10b15ff030c4e4398e2ce
SHA1c9907348cee1f64164c4c80ce296385677b8877f
SHA256bc563aa602af092bf0d18c24e090a0478bc62f71abf684069abaf933b09e3541
SHA512934ff9cd97c6726be393df1a0384d01b75cbbf9216ae3ae05ee7b1da1ac6ae7b88d9b80345b6582136d380f16e05aea2a5d50b64fbe892f01fe6c4c7a216f807
-
Filesize
656KB
MD565ef4b23060128743cef937a43b82aa3
SHA1cc72536b84384ec8479b9734b947dce885ef5d31
SHA256c843869aaca5135c2d47296985f35c71ca8af4431288d04d481c4e46cc93ee26
SHA512d06690f9aac0c6500aed387f692b3305dfc0708b08fc2f27eaa44b108908ccd8267b07f8fb8608eef5c803039caeabf8f88a18b7e5b1d850f32bbb72bcd3b0b7
-
Filesize
345KB
MD534ea7f7d66563f724318e322ff08f4db
SHA1d0aa8038a92eb43def2fffbbf4114b02636117c5
SHA256c2c12d31b4844e29de31594fc9632a372a553631de0a0a04c8af91668e37cf49
SHA512dceb1f9435b9479f6aea9b0644ba8c46338a7f458c313822a9d9b3266d79af395b9b2797ed3217c7048db8b22955ec6fe8b0b1778077fa1de587123ad9e6b148
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
1.3MB
MD5dd6667db55acaefa2d7e99dcf5d97a26
SHA1c1b281ef573df4da584294c61b5322edfed589ad
SHA256ce8fd5ec0b2ee4e5d87d35622eeaa022ee971801c97bcb3726ca6ebe4b576238
SHA512916c8b63400c0a8e495fc59d8e348499a6f04421e79599803c7ac4cd828c82f389bfd733471de27cc1643c03723429f8544446d9adc69082e6a5032139a1f1f1
-
Filesize
7KB
MD52083876ec03ad06e5c16490fcb4ab8b6
SHA1b8f50f08abd53225c046912471dfd271a98cf15a
SHA25628026de2c65972cb8fac1ff2865c33e24d1086f7242b2fe951cef172909ad128
SHA512b16f1fbe8e10b66079d83a46818423fb2e2e8619cbdc1427ce0cd27f06092af52bcc003755e939320cf84f8cc5a26c92e43041013fe3ef60c7d73d8624ee6096
-
Filesize
47KB
MD5a0e04bf9b43f0b442bd3193f06dc52b5
SHA130bb0c17640c414d948ed3e2fdf571b98f125efb
SHA25671824238c3baec179911bd6e4655ebff234e15d0f14248077e2c388ef4337009
SHA512d7015f5c8223ba0f4e3b478185fa3e4de0831aee949302185fdc8b3afe59105fe096a3e5ee23219a1c16dfcbc77d169a82774ecd727ef98bdb94a878583a2ae2
-
Filesize
4.4MB
MD538cfdd6cac508c40137ee45dc6857a59
SHA1199f87fd7bb827b75543141acf580f4e53417595
SHA2567ca69c624f9745a11ece45baaec80a3e7b596199d4997b4a3a07caecb0cb02d7
SHA512d4dc8f03288c09c82308025e138c027335067cd6b88ef078ae6a6ec2a79f12e69628ca52a08c19cf0b985acee301c0b823b42ef9830fa94c305f2377c29deb50
-
Filesize
4.9MB
MD5f97406a10af445519bbb391b22366978
SHA1400339e335bc0352a9a342008c1d146cddb1b2d2
SHA2564766966b4c125dcdbba55f6d9beacc371ee9700e0f10900a35ef9f15b3357022
SHA5121df48a68e2458109d4cbc0331ab11c1c76558d617c2a70d6f60ca3783aea7c895f05204d647986d28b8d6e48f6479e68c4b9e87176a8761219ae4b636a37c6f0
-
Filesize
33B
MD5fdf6d963491b41d9ba798f60fe27ef8c
SHA14908bfc78d191f60ab583fe093bc579fd5ff06a3
SHA256bfe1437218dd94ccd078a8683f59b65e28d8d63defa7f419b2cef81bc031a7bf
SHA51296e5981739a3328387aaf80b6b6a071dc7a2135d5bdaa99b638527b9cd82eb514d21d27a26445a01082a4ba8811ac130a671690e51cf780fd66acdd3a12a3c25
-
Filesize
2.3MB
MD56d6e172e7965d1250a4a6f8a0513aa9f
SHA1b0fd4f64e837f48682874251c93258ee2cbcad2b
SHA256d1ddd15e9c727a5ecf78d3918c17aee0512f5b181ad44952686beb89146e6bd0
SHA51235daa38ad009599145aa241102bcd1f69b4caa55ebc5bb11df0a06567056c0ec5fcd02a33576c54c670755a6384e0229fd2f96622f12304dec58f79e1e834155