Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Bloxstrap (1).exe
-
Size
4.3MB
-
Sample
250301-xev4waytdw
-
MD5
56d66e4df02b04ed21a45cc29e583679
-
SHA1
0537dc87acb3ce7b7a9b539e18e74a495f71673c
-
SHA256
d7694169a73999cbd1d8ea033b6a164321082b582eacbbbe6d3f607b563a3599
-
SHA512
b0040d61eccbe9c9cb34863379ffafec534b36357e1d5b56fa14ad9418ff1cf919f1d0f95b5b886942c16810775386ed76323d29aecd116e0b276b73e0576a98
-
SSDEEP
98304:3iLGdqIgOoD9sXV4GiXTSQdg3thqK2Oz1q70/xDTISpspijCk:XYrHGiXLdg9jz1xjplCk
Static task
static1
Behavioral task
behavioral1
Sample
Bloxstrap (1).exe
Resource
win11-20250217-en
Malware Config
Extracted
xworm
cause-indexes.gl.at.ply.gg:17210
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
Bloxstrap (1).exe
-
Size
4.3MB
-
MD5
56d66e4df02b04ed21a45cc29e583679
-
SHA1
0537dc87acb3ce7b7a9b539e18e74a495f71673c
-
SHA256
d7694169a73999cbd1d8ea033b6a164321082b582eacbbbe6d3f607b563a3599
-
SHA512
b0040d61eccbe9c9cb34863379ffafec534b36357e1d5b56fa14ad9418ff1cf919f1d0f95b5b886942c16810775386ed76323d29aecd116e0b276b73e0576a98
-
SSDEEP
98304:3iLGdqIgOoD9sXV4GiXTSQdg3thqK2Oz1q70/xDTISpspijCk:XYrHGiXLdg9jz1xjplCk
-
Detect Xworm Payload
-
UAC bypass
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Event Triggered Execution: Image File Execution Options Injection
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1