Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
EzLauncherV2.exe
Resource
win7-20240903-en
General
-
Target
EzLauncherV2.exe
-
Size
14.5MB
-
MD5
78bd6d7f86dd54b70cd0b4fcef31a0c2
-
SHA1
f1a2f8f9aeb0b2805a35f8507953a92c66e5ff60
-
SHA256
5dee1f6c0d4cae977831434dad086bf2b5c7e779056d93c155ba00fd612c92c0
-
SHA512
233bbda1972cb69308131ebea4dbbc68f3cc5780f05a41ebf35240e7fa5f7f70a1fb2118c780c9a44182306b25d4122aa6ecfa52da3fe42d4492cd530aae062b
-
SSDEEP
196608:FlROav3q3KRZu80eHnGa6d805XW+tW3EL+Er3j7tJHiVbPbNZ5rscmkkBS6sudN7:F9v3qlReHnqPVW6W0L+UpIVnNgcbuB0O
Malware Config
Extracted
xworm
127.0.0.1:8848
testing-token.gl.at.ply.gg:8848
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000c000000023bbc-4.dat family_xworm behavioral2/memory/4440-13-0x00000000007F0000-0x0000000000818000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation EzLauncherV2.exe -
Executes dropped EXE 2 IoCs
pid Process 4440 EZlauncher.exe 3400 EZLauncher(V2).exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EzLauncherV2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3400 EZLauncher(V2).exe 3400 EZLauncher(V2).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4440 EZlauncher.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3400 EZLauncher(V2).exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4320 wrote to memory of 4440 4320 EzLauncherV2.exe 89 PID 4320 wrote to memory of 4440 4320 EzLauncherV2.exe 89 PID 4320 wrote to memory of 3400 4320 EzLauncherV2.exe 90 PID 4320 wrote to memory of 3400 4320 EzLauncherV2.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\EzLauncherV2.exe"C:\Users\Admin\AppData\Local\Temp\EzLauncherV2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\EZlauncher.exe"C:\Users\Admin\AppData\Local\Temp\EZlauncher.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\EZLauncher(V2).exe"C:\Users\Admin\AppData\Local\Temp\EZLauncher(V2).exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.4MB
MD528a805c5a9f48d582c3d9c23ce22c6b8
SHA1289ac4e0af3a0555046f31df163ccc5f43e8329c
SHA256bb9c1a4fdb10cb63d4d4ab09298d2b0f42d47b577e4143a06223678172f7ce10
SHA512505a945037baf25e48a5dd97983a66f30210e301b50e25929784094048783a218f49ca9ed9aea27cafa20a5cf96a3f8d6950331fd4fa288ba7d3b339434536e8
-
Filesize
138KB
MD54ad1e2594e49d285e19a748ebc6585ea
SHA1e737bb26c69e77872aae573ed5bcc9b907bc6018
SHA2562cecb867064713031ec85c259a7f9ac7e0cc079b377f286e1e2adc18ac68c443
SHA51241ef86ebad19031d85c742a27a42aa287f9c3ef3c353f76c8a7403debdd630cf8c5e73f0f636e7317bb81dc86fba7ebe079737720bf3673b0eb26da93228cacc