Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
XAXAX.exe
-
Size
490KB
-
Sample
250213-xmtk1sspex
-
MD5
0c93a1e7eaf5d44b8b53104773e7bf42
-
SHA1
45d311fdb1f3009e83908e31b26b384d915e31d7
-
SHA256
d747cee1f79aba5af6b2e2f160a89a994f8eeb3ee9db4cbddd2ab83ce7dba4fd
-
SHA512
f8466caa3057168d979aab7189210973f040f0f2653b97b6d89f553164e30eef8b6aca415f56c7e0a45771abb0c6107d35be1f86c55e9c71d4c55a3736bac4b4
-
SSDEEP
12288:8AFQ2mhH2GnRwLb4YdTuPzcPpuYzGYth8I8wwFFvpuR6UUof:fFQ2WH2KRwoYdTugP1zGU7SMVUof
Static task
static1
Behavioral task
behavioral1
Sample
XAXAX.exe
Resource
win11-20250210-en
Malware Config
Extracted
xworm
that-mortgages.gl.at.ply.gg:22887
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
telegram
https://api.telegram.org/bot7081348414:AAEQqhREW9-Pc1-aeS5a2NxfTFybIlvMOhk/sendMessage?chat_id=6426180826
Extracted
gurcu
https://api.telegram.org/bot7081348414:AAEQqhREW9-Pc1-aeS5a2NxfTFybIlvMOhk/sendMessage?chat_id=6426180826
Targets
-
-
Target
XAXAX.exe
-
Size
490KB
-
MD5
0c93a1e7eaf5d44b8b53104773e7bf42
-
SHA1
45d311fdb1f3009e83908e31b26b384d915e31d7
-
SHA256
d747cee1f79aba5af6b2e2f160a89a994f8eeb3ee9db4cbddd2ab83ce7dba4fd
-
SHA512
f8466caa3057168d979aab7189210973f040f0f2653b97b6d89f553164e30eef8b6aca415f56c7e0a45771abb0c6107d35be1f86c55e9c71d4c55a3736bac4b4
-
SSDEEP
12288:8AFQ2mhH2GnRwLb4YdTuPzcPpuYzGYth8I8wwFFvpuR6UUof:fFQ2WH2KRwoYdTugP1zGU7SMVUof
-
Detect Xworm Payload
-
Gurcu family
-
UAC bypass
-
Windows security bypass
-
Xworm family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Drops startup file
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
4Indicator Removal
1Clear Persistence
1Modify Registry
8