Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    hdgskhajdas.exe

  • Size

    76KB

  • Sample

    240811-1cq9patcmd

  • MD5

    aa8bcf0e83ab2a2af7ce39875fd20fbe

  • SHA1

    c55ad41b192f90ca53a42ecf04db5765313ac87d

  • SHA256

    83987f4b73cdd5039147a00ee7340b05edf3d672d07e848085ec29a328173585

  • SHA512

    9dc8b2958fb7fb42a7843ad4d1a7a9c08f3e17f12c1b44ffb3b2a2a07d49d8389cbcc3ff3bbd6a52c95d4856e1721c66ceffc2ca22473f373ff070cc21ed6700

  • SSDEEP

    1536:Fi2fm7411REAwgc2/HbYftO9Y7bIKkYY+qdko76b+O1NdP0hX:DE/J6y7bIKk1Pdkp+OTdY

Malware Config

Extracted

Family

xworm

C2

147.185.221.21:4825

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    EpicGamesLauncher.exe

Targets

    • Target

      hdgskhajdas.exe

    • Size

      76KB

    • MD5

      aa8bcf0e83ab2a2af7ce39875fd20fbe

    • SHA1

      c55ad41b192f90ca53a42ecf04db5765313ac87d

    • SHA256

      83987f4b73cdd5039147a00ee7340b05edf3d672d07e848085ec29a328173585

    • SHA512

      9dc8b2958fb7fb42a7843ad4d1a7a9c08f3e17f12c1b44ffb3b2a2a07d49d8389cbcc3ff3bbd6a52c95d4856e1721c66ceffc2ca22473f373ff070cc21ed6700

    • SSDEEP

      1536:Fi2fm7411REAwgc2/HbYftO9Y7bIKkYY+qdko76b+O1NdP0hX:DE/J6y7bIKk1Pdkp+OTdY

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks