Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    36s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    f3eedde12ec9a2f363c13d643bd2acdf.exe

  • Size

    48KB

  • MD5

    f3eedde12ec9a2f363c13d643bd2acdf

  • SHA1

    2d53fef1c7b2036d4c25097fe1d3d5276cff9cb8

  • SHA256

    63c8a594926959e99dbcaac2e4bdf923691373d432500ddc0572996bfb8e399e

  • SHA512

    0f6f4ed01f591edb4565fd31169aebb3be2d2dec246459411c52db0c9c7168da4404d4657312c879980b524da6047d9a87b8a49bae5836bf40e9ebeb6f166a53

  • SSDEEP

    768:p4Q66hONMScH5lT67gmvCrPz3uRr+Ubpi6yCAHBQSE+ZO+h+ArZ6T:pXOWpzPz3WrhbpryCAhQx+ZO+do

Malware Config

Extracted

Family

xworm

Version

3.1

C2

request-busy.gl.at.ply.gg:6728

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 34 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3eedde12ec9a2f363c13d643bd2acdf.exe
    "C:\Users\Admin\AppData\Local\Temp\f3eedde12ec9a2f363c13d643bd2acdf.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:6020
    • C:\Users\Admin\AppData\Local\Temp\vpuqoz.exe
      "C:\Users\Admin\AppData\Local\Temp\vpuqoz.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /k reg delete HKCR /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:6056
        • C:\Windows\system32\reg.exe
          reg delete HKCR /f
          4⤵
          • Modifies system executable filetype association
          • Modifies registry class
          PID:2176
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x504 0x3c8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\vpuqoz.exe

    Filesize

    11KB

    MD5

    866805b3414d1f1ad797c8ef51e63860

    SHA1

    7196fd0df3f92d9c3677927b9973db196b12f1e6

    SHA256

    e65a3ff4d43861f1096c7963b848d10c831c0990f0f75b76ae9a575179776355

    SHA512

    bcb38dbe1a3d8f3b0812b3ca244608f0ae96fd38489639efd4d7c7dfa2cfcce1fbf9820b35abc9cb90ce31b8c5b032a6cc6099dde6b44a0bc2f47d4e9cbae575

  • memory/2480-23-0x0000000000B50000-0x0000000000B5A000-memory.dmp

    Filesize

    40KB

  • memory/2480-27-0x00007FFB2BE70000-0x00007FFB2C931000-memory.dmp

    Filesize

    10.8MB

  • memory/2480-28-0x00007FFB2BE70000-0x00007FFB2C931000-memory.dmp

    Filesize

    10.8MB

  • memory/2480-29-0x00007FFB2BE70000-0x00007FFB2C931000-memory.dmp

    Filesize

    10.8MB

  • memory/6020-1-0x0000000000F80000-0x0000000000F92000-memory.dmp

    Filesize

    72KB

  • memory/6020-0-0x00007FFB2BE73000-0x00007FFB2BE75000-memory.dmp

    Filesize

    8KB

  • memory/6020-8-0x00007FFB2BE70000-0x00007FFB2C931000-memory.dmp

    Filesize

    10.8MB

  • memory/6020-9-0x00007FFB2BE73000-0x00007FFB2BE75000-memory.dmp

    Filesize

    8KB

  • memory/6020-10-0x00007FFB2BE70000-0x00007FFB2C931000-memory.dmp

    Filesize

    10.8MB

  • memory/6020-11-0x0000000003240000-0x000000000324A000-memory.dmp

    Filesize

    40KB