Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
fg.exe
Resource
win7-20240903-en
General
-
Target
fg.exe
-
Size
295KB
-
MD5
570bc151bf5d20eea56d4ad306344238
-
SHA1
277af0f90afaa930f065b5d72a7fb06739031157
-
SHA256
1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a
-
SHA512
bb0671bf524a17130188a7790d29e89dba58900018ffa5b10d6945776e569e1dffad0c073ed9ab8abd2785509dc7e1fd78e4502b913e15762ffa7581f4458b4a
-
SSDEEP
1536:qg8buvyxUMWFKVwVp8M+MZZ/cPRXjqV6jZXsWxRGQ/EuRTxcLgfBZN0wpfMgn8Es:qv66xUTGLL0hJ7bbAvDYkYjUar
Malware Config
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Signatures
-
Detect Xworm Payload 7 IoCs
resource yara_rule behavioral1/files/0x0008000000016d0e-14.dat family_xworm behavioral1/memory/2004-15-0x0000000000360000-0x0000000000370000-memory.dmp family_xworm behavioral1/memory/2888-19-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2888-23-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2888-20-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2888-25-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2888-27-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2004 set thread context of 2888 2004 fg.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2888 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2004 wrote to memory of 3036 2004 fg.exe 30 PID 2004 wrote to memory of 3036 2004 fg.exe 30 PID 2004 wrote to memory of 3036 2004 fg.exe 30 PID 2004 wrote to memory of 3036 2004 fg.exe 30 PID 3036 wrote to memory of 2544 3036 csc.exe 32 PID 3036 wrote to memory of 2544 3036 csc.exe 32 PID 3036 wrote to memory of 2544 3036 csc.exe 32 PID 3036 wrote to memory of 2544 3036 csc.exe 32 PID 2004 wrote to memory of 2888 2004 fg.exe 33 PID 2004 wrote to memory of 2888 2004 fg.exe 33 PID 2004 wrote to memory of 2888 2004 fg.exe 33 PID 2004 wrote to memory of 2888 2004 fg.exe 33 PID 2004 wrote to memory of 2888 2004 fg.exe 33 PID 2004 wrote to memory of 2888 2004 fg.exe 33 PID 2004 wrote to memory of 2888 2004 fg.exe 33 PID 2004 wrote to memory of 2888 2004 fg.exe 33 PID 2004 wrote to memory of 2888 2004 fg.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fg.exe"C:\Users\Admin\AppData\Local\Temp\fg.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ose3lyeh\ose3lyeh.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB3F4.tmp" "c:\Users\Admin\AppData\Local\Temp\ose3lyeh\CSC15C3876851AF4A20A58684F4AA7826DF.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dc54b55989359b554314fb249a433538
SHA1f27ecf37280f7ab4dbe9cef9608b2bc0c904d376
SHA256bfc3dcd7d7caadb87b076c179be1adc519a958a4e76821155856c5f7aee81e8d
SHA5127221cbebea8413a3d4a9c6fe39cad2ae4ab600e356b23759c6742a8386e7b0e2a45afd227b34d53d3097daff7dc6a722e54340bcf6c42eb5624bbd499e1fd295
-
Filesize
41KB
MD5dcf92ae07ea512dfdcb62e225ea96e86
SHA18d63499909177123b6b0f51d8a07b6d32904d1a6
SHA256ba821180af83e9747300e1dedfa6cd9d0908a2fff09c3915edafc3d79a584535
SHA51259b25ac81a218cef13752c1e86d196e71845ee140d77dab359327dba9b4e06c1adf0464e18980f2499b7f9bd803e903b53538a3ad71226b18ceb094e7a8d8e5d
-
Filesize
652B
MD5b1d994eec430d7201a3bbef8c5d58db1
SHA1a618beb2f4d8f186560e50be0590d1d8cb3a86aa
SHA256aaf99522e452e92dad5f4bed94858ecb0f92be5000f79694cfb3ac910c84a4c5
SHA5122a8066e82b9bf535acf0a32e7095effb69217ba74c4df8b50ff5cb7e22755146c8790c468d8f7fc15acb91116982b140b887991cda12469b13c7a98562897c9a
-
Filesize
101KB
MD5fcb83d623452e1cafbc3b0ad5b3b5b73
SHA1abc26af231584f50ca2ae6de25d4c4764eaf7a9f
SHA256d4e8ff661b3125613fadc869675cf7c01909b4d64d06344ab2b632ab7ba1e4cc
SHA51241a233e55bca274c0c3d2fe1c6474306cb17f273bc70e7b1224603b91d17314eb3709c2cbddf2e30d5caafb4b94eb18e8b7ea7d11b19612bf1b5fa80fa9dd3d8
-
Filesize
204B
MD5e257f582aa77b931d315e58cd02effe6
SHA1394a3810696d26410e9044981c484e7a97ffe0f7
SHA256f63c08412fc66b80d74b96d89f38ed1b8e5653f246f2da78f4c16fd9399a0b35
SHA512609e993ea01df2859a023a2be9fe2ba3eb31486c56c42f294744999475c2dd67a3dd36dbc27e3a5bcdf5e1059e3197ca26df483c2e695b72a53d8790e8aad5f3