Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2025, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
185.7.214_1.211.ps1
Resource
win7-20240903-en
General
-
Target
185.7.214_1.211.ps1
-
Size
748B
-
MD5
e82a3ff48366e1f36544a3da3cabc703
-
SHA1
84796eb3285b20787b8b17765e73b7180b4931d0
-
SHA256
4a6a052cca2e26577c7e07e513a33ae7f147bfdcbbed22e3ad6ee36d4c66850e
-
SHA512
87fe6cf2aa4925e39274a7279b2349ff8aeebcd68c73a6561d3d456960b9bca8b5c0722aa0c2712804c4538793f4c1cce9ff3be3904bbd891599979e963d6173
Malware Config
Extracted
xworm
5.0
185.7.214.211:4444
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x000300000001e452-25.dat family_xworm behavioral2/memory/1740-26-0x0000018DBFBB0000-0x0000018DBFBC0000-memory.dmp family_xworm behavioral2/memory/448-28-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 7 1740 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 7 1740 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1740 set thread context of 448 1740 powershell.exe 95 -
pid Process 1740 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 powershell.exe 1740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 448 MSBuild.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1740 wrote to memory of 3124 1740 powershell.exe 93 PID 1740 wrote to memory of 3124 1740 powershell.exe 93 PID 3124 wrote to memory of 4868 3124 csc.exe 94 PID 3124 wrote to memory of 4868 3124 csc.exe 94 PID 1740 wrote to memory of 448 1740 powershell.exe 95 PID 1740 wrote to memory of 448 1740 powershell.exe 95 PID 1740 wrote to memory of 448 1740 powershell.exe 95 PID 1740 wrote to memory of 448 1740 powershell.exe 95 PID 1740 wrote to memory of 448 1740 powershell.exe 95 PID 1740 wrote to memory of 448 1740 powershell.exe 95 PID 1740 wrote to memory of 448 1740 powershell.exe 95 PID 1740 wrote to memory of 448 1740 powershell.exe 95
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\185.7.214_1.211.ps11⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\y10iophq\y10iophq.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES82FB.tmp" "c:\Users\Admin\AppData\Local\Temp\y10iophq\CSCF672D0E841FA4DD882B6767DAC3FA92.TMP"3⤵PID:4868
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ba74dd988dfe70760dfe6bd4da298316
SHA1ed5f4842e4271741666330f326e584f889571916
SHA256990917b831c4357cc420c77f732832f1a3ab0764804821d46ea494358f4d47bf
SHA51284f79aa387e3c2f22178fa31a90ce75034ab2c70ea404049265cb6615a71341845463b1ceeca6d0eebfdef33e07d8d1820a0fb62b4598249a8b709dbf916961c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
41KB
MD535e1eebc23c6668f0ad0d421f4e75c9d
SHA180dcf4859c9942cb0557b26648150558e1ab6aa6
SHA256b93bddadbc8c432af9be2adb8a2765725f9018359a1bf5d95031c67d694c6028
SHA51259056d8850ca5824fa35206b21db546343bf57c701fbd5c8d96d70a622c3673083a268b973b26ff4a33472d0aebad71a279f7886b2772e8a3ddc10a84e8b9cbf
-
Filesize
652B
MD53a74ccb51a2731dcc16722385d19f900
SHA1ad15dd7610f5beec5afe9c3b7990883cb88e33f3
SHA2560360dbdac2ee7ad9181f9a04731d80af4cc3b807bbf1ac90e832a5b580357d92
SHA512950b0aaee02065796f44647a5bc44852c2474c992d2486ecd2ebedba9fab8f5109aa729dc211460cbea51cbe6aca1924c24968c44a0db23cbd89dae1af67848f
-
Filesize
101KB
MD5cba2847534e58636a5292dc393b45fdd
SHA1ffd2fc63507cfee641ba53038d3f017a6ededbee
SHA25633561d11060d90e7a1d49d19e395fd943c2500af98521412d2390b43b6cec6bd
SHA5121b9bd2957ffe364788abcca1d90f2deb4634c89eea0a07e6a203573ed606df95b3e28ce41de038badaef674b2a8606fb8370abb3d9697b45f80f82d5e89ec1d2
-
Filesize
204B
MD591b485dd48d6754daa7751650b5bc05f
SHA10b1edb8ac47da4709f417eaed7e0f040ff5f3508
SHA256b1cc745e69aa30c86c780def21a950b37b0a462ff8a45df5e6f76afac398c231
SHA5127dff924daccdf1a3e8628ffab7510edbe334e49d66298dc102083436de3132ac86883f8e1e4a2fdf8bf39f5b2cb630f0ae59e76b325b3b0134da058b0d63f554