Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
WindowsDefender.exe
-
Size
205KB
-
Sample
241127-bhx7rawjar
-
MD5
53cb889affead37778d2ef39092d91da
-
SHA1
91820167c3b4065d07916adb0b56a867da1a68e9
-
SHA256
946cc4d31bbc501fa25c2b22efc8e07cd0ea326b276333600f98c33689d407df
-
SHA512
4cc5cbedf7a36a271e405bed1fb4beedde2c9e12e79e3100acd61b0160a9ad5f57c363457601104956f79327d7562944db8c4ae17e416fd27b0b6a39dd77d5c6
-
SSDEEP
768:BLzayT8ljccym5fCja4sYxE7FWPA9pHOMhna4OE3QjFMtUiLi8PqXhP5++:BLzgAcJ5fzFJ9pHOM1ZOE3cMt/P85U+
Behavioral task
behavioral1
Sample
WindowsDefender.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
5.0
anything-talked.gl.at.ply.gg:7897
eSQIhPW4koQzrFdT
-
Install_directory
%AppData%
-
install_file
Regedit.exe
Extracted
quasar
1.4.1
Office04
almost-visitor.gl.at.ply.gg:7995
e8e985a7-62a2-410d-91ea-7249972738eb
-
encryption_key
578EFB451288E8CFFF8CB67C63A1530F061DDBCD
-
install_name
WindowsDefender.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows.Defender.exe
-
subdirectory
SubDir
Targets
-
-
Target
WindowsDefender.exe
-
Size
205KB
-
MD5
53cb889affead37778d2ef39092d91da
-
SHA1
91820167c3b4065d07916adb0b56a867da1a68e9
-
SHA256
946cc4d31bbc501fa25c2b22efc8e07cd0ea326b276333600f98c33689d407df
-
SHA512
4cc5cbedf7a36a271e405bed1fb4beedde2c9e12e79e3100acd61b0160a9ad5f57c363457601104956f79327d7562944db8c4ae17e416fd27b0b6a39dd77d5c6
-
SSDEEP
768:BLzayT8ljccym5fCja4sYxE7FWPA9pHOMhna4OE3QjFMtUiLi8PqXhP5++:BLzgAcJ5fzFJ9pHOM1ZOE3cMt/P85U+
-
Detect Xworm Payload
-
Modifies WinLogon for persistence
-
Quasar family
-
Quasar payload
-
Xworm family
-
Drops startup file
-
Executes dropped EXE
-
Modifies file permissions
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Modifies WinLogon
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
7