Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Uac Bypass Rat.bat
-
Size
782B
-
Sample
240727-29neqsxcmh
-
MD5
010176f3c136ca25c2e29e00bc9e75a7
-
SHA1
344e7b8a9aa08b20bf17ac7f1fb01db13ad6e827
-
SHA256
a5414f82d063d24e7f0d7e417024ba796c6e52fcb07cd8e59c306fe0e05b7518
-
SHA512
5030daf2afdb75c67a38e428a9eef5c133aadf1c9484047556d3adf338bb2802ef7fc8cca01964a3715cc42c726c6d97b81ceacdfc620bfb5cab6a75b07816e0
Static task
static1
Behavioral task
behavioral1
Sample
Uac Bypass Rat.bat
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
Uac Bypass Rat.bat
Resource
win11-20240709-en
Malware Config
Extracted
xworm
5.0
las-protected.gl.at.ply.gg:59571
57uEOC4VgAs3IeCB
-
Install_directory
%Userprofile%
-
install_file
Uni.exe
Targets
-
-
Target
Uac Bypass Rat.bat
-
Size
782B
-
MD5
010176f3c136ca25c2e29e00bc9e75a7
-
SHA1
344e7b8a9aa08b20bf17ac7f1fb01db13ad6e827
-
SHA256
a5414f82d063d24e7f0d7e417024ba796c6e52fcb07cd8e59c306fe0e05b7518
-
SHA512
5030daf2afdb75c67a38e428a9eef5c133aadf1c9484047556d3adf338bb2802ef7fc8cca01964a3715cc42c726c6d97b81ceacdfc620bfb5cab6a75b07816e0
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Download via BitsAdmin
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
BITS Jobs
1Deobfuscate/Decode Files or Information
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1