Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
yr.exe
Resource
win7-20240903-en
General
-
Target
yr.exe
-
Size
295KB
-
MD5
2b6b02943108b009beff18a6001aa8d5
-
SHA1
3bcaf5f750f36421a234de0423491d9e908ee70e
-
SHA256
01565baa85ddb4b7034c620d9428024b43ae2375b8311e84aa7f06b91cc2c414
-
SHA512
9e32a5a6ea07dc8899b66a07f2f78df6cab8c7cbc8fe36e8395bc2df11bedfefbdf6c350bb685730b2c4f75340e92af9c505f0c96120f2b1d5a473329d782563
-
SSDEEP
6144:ztphTL2ojyoWcUnqaok6vfdUkD4LxG3yat6mfourGr/x+2bMq6YH+zBGh5KihRGf:ztPTL2ojyoWcUnqaok6vfdUkD4LxG3yq
Malware Config
Extracted
xworm
5.0
92.255.57.221:4414
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x0005000000022b38-14.dat family_xworm behavioral2/memory/1940-15-0x0000000005140000-0x0000000005150000-memory.dmp family_xworm behavioral2/memory/4944-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1940 set thread context of 4944 1940 yr.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4944 MSBuild.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3968 1940 yr.exe 91 PID 1940 wrote to memory of 3968 1940 yr.exe 91 PID 1940 wrote to memory of 3968 1940 yr.exe 91 PID 3968 wrote to memory of 5748 3968 csc.exe 93 PID 3968 wrote to memory of 5748 3968 csc.exe 93 PID 3968 wrote to memory of 5748 3968 csc.exe 93 PID 1940 wrote to memory of 4944 1940 yr.exe 94 PID 1940 wrote to memory of 4944 1940 yr.exe 94 PID 1940 wrote to memory of 4944 1940 yr.exe 94 PID 1940 wrote to memory of 4944 1940 yr.exe 94 PID 1940 wrote to memory of 4944 1940 yr.exe 94 PID 1940 wrote to memory of 4944 1940 yr.exe 94 PID 1940 wrote to memory of 4944 1940 yr.exe 94 PID 1940 wrote to memory of 4944 1940 yr.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\yr.exe"C:\Users\Admin\AppData\Local\Temp\yr.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5i5zezks\5i5zezks.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES433E.tmp" "c:\Users\Admin\AppData\Local\Temp\5i5zezks\CSC5FDCA8C9BD04BB384C768B6D1234B.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:5748
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5c814827d12f0c7918603ad914fd5d5cc
SHA1fb14d8f39d9a0e8f8b3cebc221abe1ff51955d53
SHA2565e728056d4b71ad436b111e93e530575dcd447d62fa9b142fc8d4fc59a8572de
SHA51259d8d9645b7898d976049952c4e139f0616d770411af4c2caf39fd8351993504683361978a5ce2ff19ed6f0ca9a818ccbacd7f3a6fa772c34d47549859ddb575
-
Filesize
1KB
MD51fac58db81538ec496ec13b9536fdd51
SHA19e734829022498cc4c73efc9a76c0a3ef6dcf227
SHA256cd0307441ee716dc1a6b90f7a91e5e9934856ed0de408e24b7e917d3b841893f
SHA512df7a18ad4c99221e612ca8053b14d1979db8e60a1057513cb2fa50135fe5a23651f43b4c84a92274d2ed9a0481146b035089cae69ab4127bc1327e9dbf537e40
-
Filesize
101KB
MD59e67e68b66e4f47ea3c120085adf937c
SHA1f14effd191647b8dc4599aabd87273510e7c4e98
SHA25661452bfbedb04b6f0f8560ca40c99e3adc1802d20df5a64f7467f83f83af38e9
SHA5122e8929a5758633ab4293924233ff7e0b5f31e722c2aafe0fc83ed2bc89efab43e719e6b5815a010070cb938da3f26af6937db1cc9de610b64233ab34a9981b7c
-
Filesize
204B
MD5388838d7ca7f9894bf7b5674e1de9120
SHA16053cb19110f5904f4220f0e5a8a05c6f2d9e1eb
SHA256825c6f70b5eee1b19d0667df70d6cc590011b2687be0b6a5022e82ba4f73b57b
SHA512c16e0ca2969e558537f6cceb8e4bda8a206fe5a6576c43f62f74b9fe993702364909797d9ee688fbd7a683fcde68fb1b0909d34d8f598fa6d4be47e38ffc8082
-
Filesize
652B
MD57b8b131eda1b1d8622b45d1bd0385270
SHA1774ec9c21633683a9d464a4650ea25270687dae0
SHA256f7a4f773b622cf3996de52129d6804f32e93791c66c14c318e711dc21c8f807d
SHA5124576350112b3750eacc79f2a74a335d04063c2377405a464972b775c82beaef935a5be133391bf385c254b76a20d145ab63f913ed23f7715d5f6c1e4943cd208