Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    ed61c0bf612856afaa8bbafbfc59af0c7526563bed4c0013c5c081c5c35e2db7

  • Size

    9.2MB

  • Sample

    250228-h4qhcstxgv

  • MD5

    e174cf5bef24f046839b5867e49e07b2

  • SHA1

    6fe00f61539dbacca1d911b6677730e29ea24e80

  • SHA256

    ed61c0bf612856afaa8bbafbfc59af0c7526563bed4c0013c5c081c5c35e2db7

  • SHA512

    bc05c3b4e566f16d4d451b82f7c9e634c2f02f9a9b4a71be43f8e106a7d5088e3a9f9bca9cb8109ffeb342452c7030381abebe7dde197a70bca1858374600ee9

  • SSDEEP

    196608:VcBJDMm9Hd6+Nu0T10BETpPGZmaltzwFB2SC4RdmKFy9lYE5SusT:VmL96U0BETpPfa82ShRdbM8

Malware Config

Extracted

Family

xworm

Mutex

0LLXgeoJ4l4QFpG6

Attributes
  • install_file

    USBDriver.exe

  • pastebin_url

    https://pastebin.com/raw/FrUYqTuA

aes.plain

Targets

    • Target

      ed61c0bf612856afaa8bbafbfc59af0c7526563bed4c0013c5c081c5c35e2db7

    • Size

      9.2MB

    • MD5

      e174cf5bef24f046839b5867e49e07b2

    • SHA1

      6fe00f61539dbacca1d911b6677730e29ea24e80

    • SHA256

      ed61c0bf612856afaa8bbafbfc59af0c7526563bed4c0013c5c081c5c35e2db7

    • SHA512

      bc05c3b4e566f16d4d451b82f7c9e634c2f02f9a9b4a71be43f8e106a7d5088e3a9f9bca9cb8109ffeb342452c7030381abebe7dde197a70bca1858374600ee9

    • SSDEEP

      196608:VcBJDMm9Hd6+Nu0T10BETpPGZmaltzwFB2SC4RdmKFy9lYE5SusT:VmL96U0BETpPfa82ShRdbM8

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks