Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2ee2e22e2e.exe
-
Size
236KB
-
Sample
250311-hrvasavrz5
-
MD5
04b6405a73eabb73ffda18cdc81dfd05
-
SHA1
87c30e3737960264bc9bfc45d699effecc47b24a
-
SHA256
bc9464c1fefdee10217ae799ab2f732f2f2b4968f428b163c60747dc3cf223b9
-
SHA512
84ae1ab47ba21cef2ed9abf8dbe002ef6c915ba2e3e8d3c521812d2fa979f9840096b342cbbcd48f5f1b7188e8f693b41db4cf1771d8f49ff5803cb0715b05e3
-
SSDEEP
3072:lDEdiqPevSK4bSRO2PnlVOQq0u8SKfbzxcwg7es6/Vsb8VKTu549oJMfF/H9N3K0:edTmEbsyUhcX7elbKTua9bfF/H9d9n
Behavioral task
behavioral1
Sample
2ee2e22e2e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ee2e22e2e.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
3.1
147.185.221.22:41812
-
Install_directory
%Userprofile%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7887692167:AAHuXEYzHn5CQbiqaKHcvU2ozy6OUZ1NSOQ/sendMessage?chat_id=6403120066
Extracted
gurcu
https://api.telegram.org/bot7887692167:AAHuXEYzHn5CQbiqaKHcvU2ozy6OUZ1NSOQ/sendMessage?chat_id=6403120066
Targets
-
-
Target
2ee2e22e2e.exe
-
Size
236KB
-
MD5
04b6405a73eabb73ffda18cdc81dfd05
-
SHA1
87c30e3737960264bc9bfc45d699effecc47b24a
-
SHA256
bc9464c1fefdee10217ae799ab2f732f2f2b4968f428b163c60747dc3cf223b9
-
SHA512
84ae1ab47ba21cef2ed9abf8dbe002ef6c915ba2e3e8d3c521812d2fa979f9840096b342cbbcd48f5f1b7188e8f693b41db4cf1771d8f49ff5803cb0715b05e3
-
SSDEEP
3072:lDEdiqPevSK4bSRO2PnlVOQq0u8SKfbzxcwg7es6/Vsb8VKTu549oJMfF/H9N3K0:edTmEbsyUhcX7elbKTua9bfF/H9d9n
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Gurcu family
-
Modifies Windows Defender Real-time Protection settings
-
Xworm family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1