Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:13

General

  • Target

    7f4990caad41dd3228d704682f251b6144a6e406233c1e3003548230e2243907.exe

  • Size

    8.6MB

  • MD5

    22852f82d88f9583ff3f02d8dd9e2987

  • SHA1

    12584d0de1d2c7a74677969075c93cad2124edc0

  • SHA256

    7f4990caad41dd3228d704682f251b6144a6e406233c1e3003548230e2243907

  • SHA512

    247e76e070b196aab063951c5635a1bb4193af70e5aec88bb82b8865a2b91d7f3095d8e64320f66e654241185a3c61610dff987a0f47db6277cde43996fb9ff5

  • SSDEEP

    196608:3/8c9MdCTp3PWQ7iaa+8G5KQHqUPpWPMZkJE9CHGxxL5HIJ64pEWEVci5:0c9NkCT75Kwq+WPMZk8hN/

Malware Config

Extracted

Family

xworm

C2

77.83.242.113:2020

Mutex

miZU0rMm5DElS6cq

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f4990caad41dd3228d704682f251b6144a6e406233c1e3003548230e2243907.exe
    "C:\Users\Admin\AppData\Local\Temp\7f4990caad41dd3228d704682f251b6144a6e406233c1e3003548230e2243907.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Roaming\Cloner by Casa.exe
      "C:\Users\Admin\AppData\Roaming\Cloner by Casa.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Users\Admin\AppData\Roaming\Cloner by Casa.exe
        "C:\Users\Admin\AppData\Roaming\Cloner by Casa.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3008
    • C:\Users\Admin\AppData\Roaming\ghost.exe
      "C:\Users\Admin\AppData\Roaming\ghost.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI25242\python310.dll

    Filesize

    4.2MB

    MD5

    a1185bef38fdba5e3fe6a71f93a9d142

    SHA1

    e2b40f5e518ad000002b239a84c153fdc35df4eb

    SHA256

    8d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e

    SHA512

    cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4

  • C:\Users\Admin\AppData\Roaming\ghost.exe

    Filesize

    30KB

    MD5

    171905da4eddf5104144138a66bf92d0

    SHA1

    7c9f7a556f67585ba0c0d2da6ca08d0c08761feb

    SHA256

    f283710dee245c076b85b0bc6fd5335528d2566711e809712abd8737b4a4c8b1

    SHA512

    8d15c9c41acf9362a5be5ac2493d0143a22d4e99dc239c91b28908ba17c9b0ea9e7040623d21a69409ccd1824d57b5eafae608b9816356b70721825e81dc20da

  • \Users\Admin\AppData\Roaming\Cloner by Casa.exe

    Filesize

    8.3MB

    MD5

    66e6140ba9e19c29529dceb265b17b41

    SHA1

    fefdb348596c3160bac45888d56e6e940a452907

    SHA256

    bded5cf8faf4c7ff8a7582538cd325da029adcae50b14f38ed4dc6adabc5673b

    SHA512

    b0a26c3d34e1f1043e06ca759d645d10c7b1ab6f05a1d5e1788714b0d568c27f2763450f2af608cf01c7947dc7f55cc403dfa3355d51c45227f2951e4d5a6944

  • memory/1716-13-0x00000000009D0000-0x00000000009DE000-memory.dmp

    Filesize

    56KB

  • memory/1716-43-0x000007FEF5250000-0x000007FEF5C3C000-memory.dmp

    Filesize

    9.9MB

  • memory/1716-45-0x000007FEF5250000-0x000007FEF5C3C000-memory.dmp

    Filesize

    9.9MB

  • memory/1716-72-0x000007FEF5250000-0x000007FEF5C3C000-memory.dmp

    Filesize

    9.9MB

  • memory/1716-73-0x000007FEF5250000-0x000007FEF5C3C000-memory.dmp

    Filesize

    9.9MB

  • memory/2548-0-0x000007FEF5253000-0x000007FEF5254000-memory.dmp

    Filesize

    4KB

  • memory/2548-1-0x0000000000CA0000-0x0000000001546000-memory.dmp

    Filesize

    8.6MB