Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
mBBBgvD.exe
Resource
win7-20240903-en
General
-
Target
mBBBgvD.exe
-
Size
2.3MB
-
MD5
120b148606efb6400aa3aeb9ce44a668
-
SHA1
e7488d6d0893c4d074f69718c8ee32da42d98207
-
SHA256
607626fde0a0263edd41db4721523682cb343600ef083fc78f23f04ca8be04b1
-
SHA512
6a5888c08f9378805978f53fd01a93dcc7f202198c12e57376c794e3f60d04c1b67dd6f51156c2ded32ae318cf73baa2b9f811fe1e99de4ddc86ac35bc2a2a43
-
SSDEEP
49152:W1vr8uwYtUeKFj/c2e4r7XplKVZo0juLx1hZf18E2yujq3:W1freFj/c2e4rinaj8E2hg
Malware Config
Extracted
xworm
95.164.19.68:1987
humtwXiPPZ6S5Ma5
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023cb7-15.dat family_xworm behavioral2/memory/4680-25-0x00000000004A0000-0x00000000004B2000-memory.dmp family_xworm -
Xmrig family
-
Xworm family
-
XMRig Miner payload 11 IoCs
resource yara_rule behavioral2/memory/3824-30-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3824-32-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3824-35-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3824-36-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3824-40-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3824-39-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3824-38-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3824-37-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3824-29-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3824-43-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/3824-44-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation mBBBgvD.exe -
Executes dropped EXE 2 IoCs
pid Process 2544 8oEhnOmMoa.exe 4680 r8oGWMoAuS.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2544 set thread context of 3824 2544 8oEhnOmMoa.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mBBBgvD.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4680 r8oGWMoAuS.exe Token: SeDebugPrivilege 2544 8oEhnOmMoa.exe Token: SeLockMemoryPrivilege 3824 explorer.exe Token: SeLockMemoryPrivilege 3824 explorer.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 116 wrote to memory of 2544 116 mBBBgvD.exe 87 PID 116 wrote to memory of 2544 116 mBBBgvD.exe 87 PID 116 wrote to memory of 4680 116 mBBBgvD.exe 88 PID 116 wrote to memory of 4680 116 mBBBgvD.exe 88 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90 PID 2544 wrote to memory of 3824 2544 8oEhnOmMoa.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\mBBBgvD.exe"C:\Users\Admin\AppData\Local\Temp\mBBBgvD.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Roaming\8oEhnOmMoa.exe"C:\Users\Admin\AppData\Roaming\8oEhnOmMoa.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:443 --user=83WC3ZPssiBd2F1wky22B8jUzY9vMUhR7DT8D7fqbm3SRjBzHiRm4ShbVzFZ72oousCnk8UTWMMRq9L2HHkka8D9Mm6TWM6 --pass=x --cpu-max-threads-hint=203⤵
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
-
C:\Users\Admin\AppData\Roaming\r8oGWMoAuS.exe"C:\Users\Admin\AppData\Roaming\r8oGWMoAuS.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5b2a071577416531d00c3292c79d4948e
SHA19918560650b15f7320361c003ab74c4c2009fe80
SHA2563fcadd3a9814a92abb993d778461db81480ba979b0da02f61947bc9fa99dbea6
SHA5126a939c6c43819fc84108a240d530aeb41c3ddfda52bf33430e24db9fba69e5c8577b3cace41c929179b306bf75c132410b45cc70d3e0692ad95ed34dec658175
-
Filesize
47KB
MD53849de855221df5c59aaf6da5ed9d7e6
SHA109d3eb1497ab5f7309bb89650108385e2c9f17c5
SHA2560373a886b98fcfec95445ba4232269961bd6eddda3612f08d0c57a2c3ba7ea6d
SHA512d6c1adf42b0b8d56a5a0f5dba64cc0053b8051fe08f8e8e642d3663ea8fc2639f24cd2ad42e8d8e9012c42ded48a2cf1251230c70d7c61021ba196928e2e02be