Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10App.exe
windows7-x64
7App.exe
windows10-2004-x64
7Freemasonry (2).exe
windows7-x64
10Freemasonry (2).exe
windows10-2004-x64
10Freemasonry.exe
windows7-x64
3Freemasonry.exe
windows10-2004-x64
7NisSrv.exe
windows7-x64
10NisSrv.exe
windows10-2004-x64
10Presentati...he.exe
windows7-x64
1Presentati...he.exe
windows10-2004-x64
10SecurityHe...2).exe
windows7-x64
10SecurityHe...2).exe
windows10-2004-x64
10SessionService.exe
windows7-x64
10SessionService.exe
windows10-2004-x64
10SgrmBroker.exe
windows7-x64
10SgrmBroker.exe
windows10-2004-x64
10SocketHeciServer.exe
windows7-x64
10SocketHeciServer.exe
windows10-2004-x64
10cmd.exe
windows7-x64
10cmd.exe
windows10-2004-x64
10Analysis
-
max time kernel
2s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 09:05
Behavioral task
behavioral1
Sample
App.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
App.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Freemasonry (2).exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Freemasonry (2).exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Freemasonry.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Freemasonry.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
NisSrv.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
NisSrv.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
PresentationFontCache.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
PresentationFontCache.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
SecurityHealthService (2).exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
SecurityHealthService (2).exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
SessionService.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
SessionService.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
SgrmBroker.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
SgrmBroker.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
SocketHeciServer.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
SocketHeciServer.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
cmd.exe
Resource
win7-20231215-en
General
-
Target
SgrmBroker.exe
-
Size
771KB
-
MD5
bda31b88c53cee7ee196b15f4f6ed413
-
SHA1
ae530f0d0459cea03e6d362e6a88c066a60e31e6
-
SHA256
d4965411f163368758c151b7d90bccfebe2067f65472847701cc880d00e15bab
-
SHA512
5b34cd28d5a5dfca43e5f2d9cf7cc156aff344b2b2c5625dfd387d81a5755d8afcb09ae723c3d76ea08930a84f92f83e8c72afc011ec61c836c27edd2b47155f
-
SSDEEP
12288:NcREkD5DFr/cp9gxh/xiAa5HLL4UYUdcpc3RrC2H1VdPQz2XzUBWOKK1sS/78yrA:NcR1vUbXvdPS1WmsS/FM
Malware Config
Extracted
xworm
3.1
-
install_file
game.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral16/files/0x0007000000023223-8.dat family_xworm behavioral16/files/0x0007000000023223-40.dat family_xworm behavioral16/files/0x0007000000023223-39.dat family_xworm behavioral16/memory/1488-41-0x0000021646770000-0x00000216467C2000-memory.dmp family_xworm behavioral16/memory/1488-49-0x0000021646B60000-0x0000021646B76000-memory.dmp family_xworm
Processes
-
C:\Users\Admin\AppData\Local\Temp\SgrmBroker.exe"C:\Users\Admin\AppData\Local\Temp\SgrmBroker.exe"1⤵PID:1976
-
C:\Users\Admin\MusNotify.exe"C:\Users\Admin\MusNotify.exe"2⤵PID:1488
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\MusNotify.exe'3⤵PID:2972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MusNotify.exe'3⤵PID:2932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\MusNotify.exe'3⤵PID:2368
-
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{2777aaee-5883-4fc0-9336-631b7f787734}1⤵PID:4912
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4300
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:936
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2564
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD579a2210a5925d6310d9d482b5f85bcce
SHA12b73103ed1be608a5221273f7a159d2349f06928
SHA2562ca0e8bd087581bd0681ff5e6a606193b30dba476cb2b716e35f4f09ea8f99c4
SHA512b946dff86a920c3109c1d2a815cc8eb1493f1495212f190bc7ae78aee2ff7b056333fa3881371265f21f3249fc3cca81441555c77ece5fd20ce3cf0926f8bf86
-
Filesize
87KB
MD5ceb0f5cb1da01fab16624aa8a7842915
SHA1aca76eafd674e2b37179d25cc49f43ecbad3dc45
SHA2567b3e127602a19748c7e83166cf6f57ec41dfa5682246d21e78e05311d6a705af
SHA51276284b854abc41055aaf0361e96f9852378cf4c762571c8316b9b1440ee453de266c8aca2918a1aa92d2fdf751d6a3ab6e1d48bc7ed3982c65850e628f6d7e99
-
Filesize
138KB
MD53334ba88b2b6d535834ff13338b88155
SHA10fc5cf7e1290443a7886abd335c4c7b751c7a1c7
SHA256fef258d5b6aa55d8d8ea627a2526e226283a30ea62f4ffb7564830d378d8ab8f
SHA51216913ef4202b7166f39132108f026fd34d1bf0ed40b9e8cef9936c464fb6ddcce20275334a3a43ec05d0a3f2e04cbc433c201739367d584af125c3f2574d35a5