Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
139s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01/03/2025, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
mBBBgvD.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
mBBBgvD.exe
-
Size
2.3MB
-
MD5
120b148606efb6400aa3aeb9ce44a668
-
SHA1
e7488d6d0893c4d074f69718c8ee32da42d98207
-
SHA256
607626fde0a0263edd41db4721523682cb343600ef083fc78f23f04ca8be04b1
-
SHA512
6a5888c08f9378805978f53fd01a93dcc7f202198c12e57376c794e3f60d04c1b67dd6f51156c2ded32ae318cf73baa2b9f811fe1e99de4ddc86ac35bc2a2a43
-
SSDEEP
49152:W1vr8uwYtUeKFj/c2e4r7XplKVZo0juLx1hZf18E2yujq3:W1freFj/c2e4rinaj8E2hg
Malware Config
Extracted
xworm
95.164.19.68:1987
humtwXiPPZ6S5Ma5
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000027d4e-16.dat family_xworm behavioral1/memory/1236-31-0x0000000000080000-0x0000000000092000-memory.dmp family_xworm -
Xmrig family
-
Xworm family
-
XMRig Miner payload 11 IoCs
resource yara_rule behavioral1/memory/4088-35-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4088-41-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4088-43-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4088-44-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4088-46-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4088-45-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4088-42-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4088-38-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4088-37-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4088-49-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4088-50-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-80166876-2127584002-2233670790-1000\Control Panel\International\Geo\Nation mBBBgvD.exe -
Executes dropped EXE 2 IoCs
pid Process 4996 IMLTR99mta.exe 1236 gV9z1rJU0O.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4996 set thread context of 4088 4996 IMLTR99mta.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mBBBgvD.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1236 gV9z1rJU0O.exe Token: SeDebugPrivilege 4996 IMLTR99mta.exe Token: SeLockMemoryPrivilege 4088 explorer.exe Token: SeLockMemoryPrivilege 4088 explorer.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4648 wrote to memory of 4996 4648 mBBBgvD.exe 84 PID 4648 wrote to memory of 4996 4648 mBBBgvD.exe 84 PID 4648 wrote to memory of 1236 4648 mBBBgvD.exe 85 PID 4648 wrote to memory of 1236 4648 mBBBgvD.exe 85 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87 PID 4996 wrote to memory of 4088 4996 IMLTR99mta.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\mBBBgvD.exe"C:\Users\Admin\AppData\Local\Temp\mBBBgvD.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Roaming\IMLTR99mta.exe"C:\Users\Admin\AppData\Roaming\IMLTR99mta.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:443 --user=83WC3ZPssiBd2F1wky22B8jUzY9vMUhR7DT8D7fqbm3SRjBzHiRm4ShbVzFZ72oousCnk8UTWMMRq9L2HHkka8D9Mm6TWM6 --pass=x --cpu-max-threads-hint=203⤵
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
-
C:\Users\Admin\AppData\Roaming\gV9z1rJU0O.exe"C:\Users\Admin\AppData\Roaming\gV9z1rJU0O.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5b2a071577416531d00c3292c79d4948e
SHA19918560650b15f7320361c003ab74c4c2009fe80
SHA2563fcadd3a9814a92abb993d778461db81480ba979b0da02f61947bc9fa99dbea6
SHA5126a939c6c43819fc84108a240d530aeb41c3ddfda52bf33430e24db9fba69e5c8577b3cace41c929179b306bf75c132410b45cc70d3e0692ad95ed34dec658175
-
Filesize
47KB
MD53849de855221df5c59aaf6da5ed9d7e6
SHA109d3eb1497ab5f7309bb89650108385e2c9f17c5
SHA2560373a886b98fcfec95445ba4232269961bd6eddda3612f08d0c57a2c3ba7ea6d
SHA512d6c1adf42b0b8d56a5a0f5dba64cc0053b8051fe08f8e8e642d3663ea8fc2639f24cd2ad42e8d8e9012c42ded48a2cf1251230c70d7c61021ba196928e2e02be