Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
fg.exe
Resource
win7-20240903-en
General
-
Target
fg.exe
-
Size
295KB
-
MD5
570bc151bf5d20eea56d4ad306344238
-
SHA1
277af0f90afaa930f065b5d72a7fb06739031157
-
SHA256
1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a
-
SHA512
bb0671bf524a17130188a7790d29e89dba58900018ffa5b10d6945776e569e1dffad0c073ed9ab8abd2785509dc7e1fd78e4502b913e15762ffa7581f4458b4a
-
SSDEEP
1536:qg8buvyxUMWFKVwVp8M+MZZ/cPRXjqV6jZXsWxRGQ/EuRTxcLgfBZN0wpfMgn8Es:qv66xUTGLL0hJ7bbAvDYkYjUar
Malware Config
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x00050000000229c7-14.dat family_xworm behavioral2/memory/3392-15-0x0000000005210000-0x0000000005220000-memory.dmp family_xworm behavioral2/memory/436-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3392 set thread context of 436 3392 fg.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 436 MSBuild.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3392 wrote to memory of 4260 3392 fg.exe 91 PID 3392 wrote to memory of 4260 3392 fg.exe 91 PID 3392 wrote to memory of 4260 3392 fg.exe 91 PID 4260 wrote to memory of 3084 4260 csc.exe 94 PID 4260 wrote to memory of 3084 4260 csc.exe 94 PID 4260 wrote to memory of 3084 4260 csc.exe 94 PID 3392 wrote to memory of 436 3392 fg.exe 95 PID 3392 wrote to memory of 436 3392 fg.exe 95 PID 3392 wrote to memory of 436 3392 fg.exe 95 PID 3392 wrote to memory of 436 3392 fg.exe 95 PID 3392 wrote to memory of 436 3392 fg.exe 95 PID 3392 wrote to memory of 436 3392 fg.exe 95 PID 3392 wrote to memory of 436 3392 fg.exe 95 PID 3392 wrote to memory of 436 3392 fg.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\fg.exe"C:\Users\Admin\AppData\Local\Temp\fg.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wnz5gkzt\wnz5gkzt.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES950C.tmp" "c:\Users\Admin\AppData\Local\Temp\wnz5gkzt\CSC9580088BBE4845198680FF63DC7A6BD5.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3084
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD562d3eedbe450241a8dd808b26e8a243f
SHA1d98edcdc40be6a475144b5d7dad26395bcdc41ed
SHA256397003d41648b141a3338204f25b398ba6d6441c76736f9295b7b1570efbb802
SHA512de7ca83c2f56897d2acedbd31d3679eabd500269291af09985c30d73d116282aaca8a9c1b0305b402a5aa8115d5c1fbdde2471204f68bc24d00dd79796f2059a
-
Filesize
41KB
MD5b4c8ba3f5c8da1eab69aef62094ba26c
SHA11282b7bb60b1ea49fa244b21b91bd0ef10d52275
SHA256e2a0f146a20112ba5af5422a636aa020d7167836ed7f4b12fb2d8f7dc702b9c3
SHA51289efd5fa2aa07bbacd789549ed49faf5c29a67e3accd1f0f7218a4c47293a0b46e7a678d8f5561fe14e8e9f1777e5c7effef41bafa9b17ee4cd8691e5472c058
-
Filesize
652B
MD54ed06f798fafd639ad8206556dcded80
SHA16d12c094acd3016df71ac5b236f9712630becc6e
SHA256858fe3e2d7dae8f2d2c65bb2db48015097be9dfcffed4d6ba34598f47e3c5b97
SHA512b4d84b79443bba3ebff223750d802fb8baf271a5c010a3a37437c6a78e0d5b69e4d74f658dee1845f5bae7ba88b8a170c4deb71a5f5f14bf731ec529ad542fad
-
Filesize
101KB
MD5fcb83d623452e1cafbc3b0ad5b3b5b73
SHA1abc26af231584f50ca2ae6de25d4c4764eaf7a9f
SHA256d4e8ff661b3125613fadc869675cf7c01909b4d64d06344ab2b632ab7ba1e4cc
SHA51241a233e55bca274c0c3d2fe1c6474306cb17f273bc70e7b1224603b91d17314eb3709c2cbddf2e30d5caafb4b94eb18e8b7ea7d11b19612bf1b5fa80fa9dd3d8
-
Filesize
204B
MD5c39f78972e98d2680cdfcf77290e1c85
SHA125946e03755a976ed2d4c9d328dd771de8d47d39
SHA256beaeb87ae537d6f783ff6673ae062d09a435db92a376cf36586088a998b0655d
SHA512c88f8194084cf62b8a9ac00baa08693b23cf1b751192448f51cbffc2d6c9813d212fa539e2f2e3ac2c4ef6680bcd0cd4039b609940bbcf4c71e527e90914b979