Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe
Resource
win7-20240903-en
General
-
Target
1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe
-
Size
295KB
-
MD5
570bc151bf5d20eea56d4ad306344238
-
SHA1
277af0f90afaa930f065b5d72a7fb06739031157
-
SHA256
1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a
-
SHA512
bb0671bf524a17130188a7790d29e89dba58900018ffa5b10d6945776e569e1dffad0c073ed9ab8abd2785509dc7e1fd78e4502b913e15762ffa7581f4458b4a
-
SSDEEP
1536:qg8buvyxUMWFKVwVp8M+MZZ/cPRXjqV6jZXsWxRGQ/EuRTxcLgfBZN0wpfMgn8Es:qv66xUTGLL0hJ7bbAvDYkYjUar
Malware Config
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x000400000001e681-14.dat family_xworm behavioral2/memory/376-15-0x0000000005750000-0x0000000005760000-memory.dmp family_xworm behavioral2/memory/3168-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 376 set thread context of 3168 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3168 MSBuild.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 376 wrote to memory of 3792 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 88 PID 376 wrote to memory of 3792 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 88 PID 376 wrote to memory of 3792 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 88 PID 3792 wrote to memory of 2524 3792 csc.exe 90 PID 3792 wrote to memory of 2524 3792 csc.exe 90 PID 3792 wrote to memory of 2524 3792 csc.exe 90 PID 376 wrote to memory of 3168 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 91 PID 376 wrote to memory of 3168 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 91 PID 376 wrote to memory of 3168 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 91 PID 376 wrote to memory of 3168 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 91 PID 376 wrote to memory of 3168 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 91 PID 376 wrote to memory of 3168 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 91 PID 376 wrote to memory of 3168 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 91 PID 376 wrote to memory of 3168 376 1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe"C:\Users\Admin\AppData\Local\Temp\1be3f3449a4fbe09203249d212c1abe8aead0d3e3ad9c499f0c0e9aaa76f198a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wylr4jn3\wylr4jn3.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF57C.tmp" "c:\Users\Admin\AppData\Local\Temp\wylr4jn3\CSCC21F2BD1FE774C1EA879BA31D87CD3.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2524
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD558e05d4cf55bffbb269e55547236bec1
SHA196d0c1a85b7811ce5255677697419b2fece355c6
SHA2569facafaabf3a41e8e73c4be319f68bae1a0fe3a5b29258ec61fb599868a0e9d3
SHA5121a40eab19bf65627162a372bf58ae605223b7b91f639c0c1a02185e5c5b9395cf13aa0d132ddcb2b8cefc9e71cf6657bfd313973d8ab08788aab2d36f9fd1bdc
-
Filesize
41KB
MD5f5c10a0758631d6f99f973df7718f9ee
SHA185cf78e4842f39befc5d3cd6b7cb7d52db2d1320
SHA2566e04470fb7c229fa60570942f793d3e8614657bd0e1a43588af28b7f684a48db
SHA5129e1bdcfeddc710bc28b63ca7d529c54724ae35182d9d626cb58475a3798affebf9686cc6574bf9c3859db0f4434b5d34ce134c4b5ea2a78d61a422d7a297fa9a
-
Filesize
652B
MD53f4c74a25a8784bf49b7f64d6501fc13
SHA18342e22a458a5261c7428add3c7c7b83d59c0b15
SHA256e7ce65bf633b93b45fd45c4e82a61d0686df771ca94af8066f1d8e2cb6216b6c
SHA512d7293e1336abfed17e7cca5b789af8392cc1b919dc356e12d3a54c8c9f0e8d902c4cdeda54a9a45c0afd5f8d494231bbe3e01c261764a072f417434141d22f36
-
Filesize
101KB
MD5fcb83d623452e1cafbc3b0ad5b3b5b73
SHA1abc26af231584f50ca2ae6de25d4c4764eaf7a9f
SHA256d4e8ff661b3125613fadc869675cf7c01909b4d64d06344ab2b632ab7ba1e4cc
SHA51241a233e55bca274c0c3d2fe1c6474306cb17f273bc70e7b1224603b91d17314eb3709c2cbddf2e30d5caafb4b94eb18e8b7ea7d11b19612bf1b5fa80fa9dd3d8
-
Filesize
204B
MD5562c180dda6d16babe883181bc030225
SHA18200aee7a4870e933547ff0950ea0792acf59d85
SHA256f7124f34d9e8bbe1e0ea9f1d96930df99faacb6521cf204a7f95c02d87024f01
SHA5128f2501e723b5003ead16fca48eb8be3c4b5ac96dfec220a24ea1890333fde27f7094530566b83b327c09ac4568d2772341cc046da0caae0857c30e185367247f