Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
thisisarattest.exe
-
Size
60KB
-
Sample
250310-jhcvtaxmv6
-
MD5
2c6f4ffe691f274308bd5006910c1f56
-
SHA1
b9e73b268b3eb224d40970665d32e0738b07a2bb
-
SHA256
ff5b1ec5fb58008e41b2ebab7b5970fd0302e8ad99aee4936a43d2114eefd270
-
SHA512
0367acdba25317f1f647bf061b5b8a0b542b5cb2f211366e4d3af3dcbacc7f0a24ff3142bfe89b60dd0384620c978b52527b442af878684479f3548176848bdb
-
SSDEEP
1536:3jrs9Zwd1hp1SQcq8/WZZbB7HV6B2O+k9f2lE02:T2ZcSI8/WZZbB7zOZ9ult2
Behavioral task
behavioral1
Sample
thisisarattest.exe
Resource
win11-20250217-en
Malware Config
Extracted
xworm
116.251.133.7:27572
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Targets
-
-
Target
thisisarattest.exe
-
Size
60KB
-
MD5
2c6f4ffe691f274308bd5006910c1f56
-
SHA1
b9e73b268b3eb224d40970665d32e0738b07a2bb
-
SHA256
ff5b1ec5fb58008e41b2ebab7b5970fd0302e8ad99aee4936a43d2114eefd270
-
SHA512
0367acdba25317f1f647bf061b5b8a0b542b5cb2f211366e4d3af3dcbacc7f0a24ff3142bfe89b60dd0384620c978b52527b442af878684479f3548176848bdb
-
SSDEEP
1536:3jrs9Zwd1hp1SQcq8/WZZbB7HV6B2O+k9f2lE02:T2ZcSI8/WZZbB7zOZ9ult2
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Xworm family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3