Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
431s -
max time network
897s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/03/2025, 16:24
Static task
static1
General
-
Target
mBBBgvD.exe
-
Size
2.3MB
-
MD5
120b148606efb6400aa3aeb9ce44a668
-
SHA1
e7488d6d0893c4d074f69718c8ee32da42d98207
-
SHA256
607626fde0a0263edd41db4721523682cb343600ef083fc78f23f04ca8be04b1
-
SHA512
6a5888c08f9378805978f53fd01a93dcc7f202198c12e57376c794e3f60d04c1b67dd6f51156c2ded32ae318cf73baa2b9f811fe1e99de4ddc86ac35bc2a2a43
-
SSDEEP
49152:W1vr8uwYtUeKFj/c2e4r7XplKVZo0juLx1hZf18E2yujq3:W1freFj/c2e4rinaj8E2hg
Malware Config
Extracted
xworm
95.164.19.68:1987
humtwXiPPZ6S5Ma5
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x001900000002ae5f-15.dat family_xworm behavioral1/memory/1988-25-0x0000000000E70000-0x0000000000E82000-memory.dmp family_xworm -
Xmrig family
-
Xworm family
-
XMRig Miner payload 11 IoCs
resource yara_rule behavioral1/memory/4328-30-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4328-32-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4328-35-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4328-29-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4328-36-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4328-39-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4328-38-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4328-37-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4328-40-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4328-43-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral1/memory/4328-44-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Executes dropped EXE 2 IoCs
pid Process 3744 poshj2NaCF.exe 1988 jpHaT4i4dX.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3744 set thread context of 4328 3744 poshj2NaCF.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mBBBgvD.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1988 jpHaT4i4dX.exe Token: SeDebugPrivilege 3744 poshj2NaCF.exe Token: SeLockMemoryPrivilege 4328 explorer.exe Token: SeLockMemoryPrivilege 4328 explorer.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2568 wrote to memory of 3744 2568 mBBBgvD.exe 82 PID 2568 wrote to memory of 3744 2568 mBBBgvD.exe 82 PID 2568 wrote to memory of 1988 2568 mBBBgvD.exe 83 PID 2568 wrote to memory of 1988 2568 mBBBgvD.exe 83 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85 PID 3744 wrote to memory of 4328 3744 poshj2NaCF.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\mBBBgvD.exe"C:\Users\Admin\AppData\Local\Temp\mBBBgvD.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\poshj2NaCF.exe"C:\Users\Admin\AppData\Roaming\poshj2NaCF.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:443 --user=83WC3ZPssiBd2F1wky22B8jUzY9vMUhR7DT8D7fqbm3SRjBzHiRm4ShbVzFZ72oousCnk8UTWMMRq9L2HHkka8D9Mm6TWM6 --pass=x --cpu-max-threads-hint=203⤵
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
-
C:\Users\Admin\AppData\Roaming\jpHaT4i4dX.exe"C:\Users\Admin\AppData\Roaming\jpHaT4i4dX.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD53849de855221df5c59aaf6da5ed9d7e6
SHA109d3eb1497ab5f7309bb89650108385e2c9f17c5
SHA2560373a886b98fcfec95445ba4232269961bd6eddda3612f08d0c57a2c3ba7ea6d
SHA512d6c1adf42b0b8d56a5a0f5dba64cc0053b8051fe08f8e8e642d3663ea8fc2639f24cd2ad42e8d8e9012c42ded48a2cf1251230c70d7c61021ba196928e2e02be
-
Filesize
2.1MB
MD5b2a071577416531d00c3292c79d4948e
SHA19918560650b15f7320361c003ab74c4c2009fe80
SHA2563fcadd3a9814a92abb993d778461db81480ba979b0da02f61947bc9fa99dbea6
SHA5126a939c6c43819fc84108a240d530aeb41c3ddfda52bf33430e24db9fba69e5c8577b3cace41c929179b306bf75c132410b45cc70d3e0692ad95ed34dec658175