Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 18:17

General

  • Target

    WizWorm v4/WizWorm.exe

  • Size

    14.3MB

  • MD5

    0d7b4b1882f63bdd50b95c566d71ae14

  • SHA1

    fd44458018d9ba5beee8a67b7f22bb5c6e1f850d

  • SHA256

    4a095cf379d66c7123416fec489a8ef6b767fec71959e13714127d6c3bb41c06

  • SHA512

    97ad65c805be31d1d530077b4736ff4c844c51a2d4550e856933f08a328e4c74ecef7e22040a27e9a03509170c4bc780e26b0389cb57385d5217f56d68a7aeda

  • SSDEEP

    393216:q3vfM+4csPWDxmpDz05h8HpCLemOEkHh1og2CrVJCmvT:q3vfM+4cVm25hspRmIAWvH

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:5552

Mutex

MNdMde9kZ2Fr79GR

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 55 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WizWorm v4\WizWorm.exe
    "C:\Users\Admin\AppData\Local\Temp\WizWorm v4\WizWorm.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3696
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\5ibg1qcj\5ibg1qcj.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4476
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES24B5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9000E77739184BD38B36FAE838D6CAE6.TMP"
        3⤵
          PID:4252
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:4464
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x468 0x470
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3040
      • C:\Users\Admin\Desktop\WizClient.exe
        "C:\Users\Admin\Desktop\WizClient.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4396

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\5ibg1qcj\5ibg1qcj.0.vb

        Filesize

        73KB

        MD5

        b3a52dfc291ee9a64f0c0349ed88eeb1

        SHA1

        a61fa80d049c4449bf1e075328c329608e473b85

        SHA256

        8258716ddc220f4e066adb41bd6bbec6359ed42b31242210a21fc36555ad5bc7

        SHA512

        c0ffbd2f578522a865bcc7c78dff396516e3083ba92acba7de504b32dbf3211ed81da8248320e4bf862f78413de27e6aa2b4d49a3724244e6c32bc08c5991a20

      • C:\Users\Admin\AppData\Local\Temp\5ibg1qcj\5ibg1qcj.cmdline

        Filesize

        292B

        MD5

        4a3c9b96e864b9f08d8bceb25525fbd4

        SHA1

        5bf44709d7fde003eda1bebdb51ab42e93946df1

        SHA256

        b977ebdbe986db9e2e372b7c458d258162522786c01e38aeebf712770b2c8b65

        SHA512

        096719119eeda4d40f1ae72511814432a3170b7b5305c15cd92c723142f293b468b907a0d8fc99dd1933efbd7850c68c00830d25d40a94e6594c5f13c132d1b3

      • C:\Users\Admin\AppData\Local\Temp\RES24B5.tmp

        Filesize

        1KB

        MD5

        b02c6b80741f998eeafcf712f46ba961

        SHA1

        de2359633672f20ba51b2a1779bf8f7d9b96aaea

        SHA256

        f484de38c926f538665121a70a27fb74a0d855844b35a27c2e1ccec749cff48f

        SHA512

        29811f041481f543422b9e622db428b6735fa8178bca0e735ff0327866c28607264f29b50a44e67bb835a31ad331e0c6bb3d83dd21ad3663cbd6f2b73f6788b6

      • C:\Users\Admin\AppData\Local\Temp\vbc9000E77739184BD38B36FAE838D6CAE6.TMP

        Filesize

        1KB

        MD5

        85d473aaafaeafa39833a0adf1902ab4

        SHA1

        fd63bebbbbcc47d55520acc72548f78e8d6c4784

        SHA256

        9a8f53996a1dd339db9f03cf68a73abb1a80a7b09c2afc0a9f72b243a44256fb

        SHA512

        e6807073fffb95411365ee03fdaab041e7c91955361576e732595396f7b78606982bb4ac48e17a76d0f3812a125bb1e0aa9b3634e64d17eb0f336681246ea8d6

      • C:\Users\Admin\Desktop\WizClient.exe

        Filesize

        30KB

        MD5

        9feffe5c04a6b9f082c862665ff6915a

        SHA1

        8cd2c3f85c7627f64877f264494eb1e1d16a859a

        SHA256

        63d774998b76398a1faedd6fcffc6f834c2d7bf46766e0eeed1cc38a3c6409c2

        SHA512

        348312e9b609d8f701bd5faa9640051159ee34f80f31536b851ad5ecc09d1de7bf6af79811de5ca5a2b2b5099fe7c75b592f91742900fbd4603c1d268a4a5079

      • memory/3696-9-0x00007FFB572C0000-0x00007FFB57D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3696-21-0x00007FFB572C0000-0x00007FFB57D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3696-0-0x00007FFB572C3000-0x00007FFB572C5000-memory.dmp

        Filesize

        8KB

      • memory/3696-10-0x000001F5C95F0000-0x000001F5C969A000-memory.dmp

        Filesize

        680KB

      • memory/3696-11-0x00007FFB572C3000-0x00007FFB572C5000-memory.dmp

        Filesize

        8KB

      • memory/3696-12-0x00007FFB572C0000-0x00007FFB57D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3696-13-0x00007FFB572C0000-0x00007FFB57D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3696-14-0x00007FFB572C0000-0x00007FFB57D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3696-17-0x00007FFB572C0000-0x00007FFB57D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3696-18-0x00007FFB572C0000-0x00007FFB57D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3696-19-0x00007FFB572C0000-0x00007FFB57D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3696-6-0x000001F5C56D0000-0x000001F5C58C4000-memory.dmp

        Filesize

        2.0MB

      • memory/3696-22-0x000001F5EBB90000-0x000001F5EBCF8000-memory.dmp

        Filesize

        1.4MB

      • memory/3696-5-0x000001F5AB8B0000-0x000001F5AB8C2000-memory.dmp

        Filesize

        72KB

      • memory/3696-4-0x000001F5AB910000-0x000001F5AB96C000-memory.dmp

        Filesize

        368KB

      • memory/3696-3-0x000001F5C41E0000-0x000001F5C53D2000-memory.dmp

        Filesize

        17.9MB

      • memory/3696-2-0x00007FFB572C0000-0x00007FFB57D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3696-1-0x000001F5A8D20000-0x000001F5A9B7E000-memory.dmp

        Filesize

        14.4MB

      • memory/3696-38-0x00007FFB572C0000-0x00007FFB57D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3696-43-0x000001F5EBE60000-0x000001F5EBEE2000-memory.dmp

        Filesize

        520KB

      • memory/3696-41-0x000001F5EB8F0000-0x000001F5EB91C000-memory.dmp

        Filesize

        176KB

      • memory/3696-42-0x000001F5EBFF0000-0x000001F5EC2D2000-memory.dmp

        Filesize

        2.9MB

      • memory/4396-40-0x0000000000010000-0x000000000001E000-memory.dmp

        Filesize

        56KB

      • memory/4396-44-0x00000000022A0000-0x00000000022AC000-memory.dmp

        Filesize

        48KB