Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
mBBBgvD.exe
Resource
win7-20240903-en
General
-
Target
mBBBgvD.exe
-
Size
2.3MB
-
MD5
120b148606efb6400aa3aeb9ce44a668
-
SHA1
e7488d6d0893c4d074f69718c8ee32da42d98207
-
SHA256
607626fde0a0263edd41db4721523682cb343600ef083fc78f23f04ca8be04b1
-
SHA512
6a5888c08f9378805978f53fd01a93dcc7f202198c12e57376c794e3f60d04c1b67dd6f51156c2ded32ae318cf73baa2b9f811fe1e99de4ddc86ac35bc2a2a43
-
SSDEEP
49152:W1vr8uwYtUeKFj/c2e4r7XplKVZo0juLx1hZf18E2yujq3:W1freFj/c2e4rinaj8E2hg
Malware Config
Extracted
xworm
95.164.19.68:1987
humtwXiPPZ6S5Ma5
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016edb-11.dat family_xworm behavioral1/memory/2728-12-0x00000000000B0000-0x00000000000C2000-memory.dmp family_xworm -
Xmrig family
-
Xworm family
-
XMRig Miner payload 17 IoCs
resource yara_rule behavioral1/memory/2620-21-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-27-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-40-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-37-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-35-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-33-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-31-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-29-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-25-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-46-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-47-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-45-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-44-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-43-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-23-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-41-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/2620-48-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Executes dropped EXE 2 IoCs
pid Process 2680 wQi7uzCnF9.exe 2728 qqL4RIbPs6.exe -
Loads dropped DLL 2 IoCs
pid Process 2236 mBBBgvD.exe 2236 mBBBgvD.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2680 set thread context of 2620 2680 wQi7uzCnF9.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mBBBgvD.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2728 qqL4RIbPs6.exe Token: SeDebugPrivilege 2680 wQi7uzCnF9.exe Token: SeLockMemoryPrivilege 2620 explorer.exe Token: SeLockMemoryPrivilege 2620 explorer.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2680 2236 mBBBgvD.exe 30 PID 2236 wrote to memory of 2680 2236 mBBBgvD.exe 30 PID 2236 wrote to memory of 2680 2236 mBBBgvD.exe 30 PID 2236 wrote to memory of 2680 2236 mBBBgvD.exe 30 PID 2236 wrote to memory of 2728 2236 mBBBgvD.exe 31 PID 2236 wrote to memory of 2728 2236 mBBBgvD.exe 31 PID 2236 wrote to memory of 2728 2236 mBBBgvD.exe 31 PID 2236 wrote to memory of 2728 2236 mBBBgvD.exe 31 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33 PID 2680 wrote to memory of 2620 2680 wQi7uzCnF9.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\mBBBgvD.exe"C:\Users\Admin\AppData\Local\Temp\mBBBgvD.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Roaming\wQi7uzCnF9.exe"C:\Users\Admin\AppData\Roaming\wQi7uzCnF9.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:443 --user=83WC3ZPssiBd2F1wky22B8jUzY9vMUhR7DT8D7fqbm3SRjBzHiRm4ShbVzFZ72oousCnk8UTWMMRq9L2HHkka8D9Mm6TWM6 --pass=x --cpu-max-threads-hint=203⤵
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
-
C:\Users\Admin\AppData\Roaming\qqL4RIbPs6.exe"C:\Users\Admin\AppData\Roaming\qqL4RIbPs6.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD53849de855221df5c59aaf6da5ed9d7e6
SHA109d3eb1497ab5f7309bb89650108385e2c9f17c5
SHA2560373a886b98fcfec95445ba4232269961bd6eddda3612f08d0c57a2c3ba7ea6d
SHA512d6c1adf42b0b8d56a5a0f5dba64cc0053b8051fe08f8e8e642d3663ea8fc2639f24cd2ad42e8d8e9012c42ded48a2cf1251230c70d7c61021ba196928e2e02be
-
Filesize
2.1MB
MD5b2a071577416531d00c3292c79d4948e
SHA19918560650b15f7320361c003ab74c4c2009fe80
SHA2563fcadd3a9814a92abb993d778461db81480ba979b0da02f61947bc9fa99dbea6
SHA5126a939c6c43819fc84108a240d530aeb41c3ddfda52bf33430e24db9fba69e5c8577b3cace41c929179b306bf75c132410b45cc70d3e0692ad95ed34dec658175