Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
07/10/2023, 18:50
231007-xhdn1aee5y 707/10/2023, 18:45
231007-xd334agh66 707/10/2023, 18:42
231007-xcf7yaed8z 707/10/2023, 18:38
231007-xaftdsgh34 707/10/2023, 18:30
231007-w5zdjsgg59 10Analysis
-
max time kernel
127s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
07/10/2023, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10-20230915-en
General
-
Target
Loader.exe
-
Size
133KB
-
MD5
fc3378c4e8cd002ba1e8a05b37f09d24
-
SHA1
6b3620287c4f94d2f515c1a8577fffcc02331b0c
-
SHA256
2b03faa10419218a0214b4ef415ecc41d9c78a8031deaf89d9d836b8fcd54089
-
SHA512
c1ac224a9aad0dde67f5ec4b4ae9f4921cb7718bf1a27755d32de6ea04f8aaf09864228c0d576492bbd1742209333b988429a3e277b1f4d19ea068b1e548fe69
-
SSDEEP
1536:yxYnIibKxkGHHIy2MwxIQ+b/zvc5j6xOVHRvUF80XbpGQqmyVttdGFQeOPigE:aLRIHpx3+bb5OVHpUFNcQqmyBeT
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWorm Auto Updater.lnk Loader.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWorm Auto Updater.lnk Loader.exe -
Executes dropped EXE 2 IoCs
pid Process 4852 XWorm Auto Updater 4284 XWorm Auto Updater -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2204032094-4125186646-761438227-1000\Software\Microsoft\Windows\CurrentVersion\Run\XWorm Auto Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XWorm Auto Updater" Loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4296 powershell.exe 4296 powershell.exe 4296 powershell.exe 648 powershell.exe 648 powershell.exe 648 powershell.exe 2176 powershell.exe 2176 powershell.exe 2176 powershell.exe 392 powershell.exe 392 powershell.exe 392 powershell.exe 5092 Loader.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5092 Loader.exe Token: SeDebugPrivilege 4296 powershell.exe Token: SeIncreaseQuotaPrivilege 4296 powershell.exe Token: SeSecurityPrivilege 4296 powershell.exe Token: SeTakeOwnershipPrivilege 4296 powershell.exe Token: SeLoadDriverPrivilege 4296 powershell.exe Token: SeSystemProfilePrivilege 4296 powershell.exe Token: SeSystemtimePrivilege 4296 powershell.exe Token: SeProfSingleProcessPrivilege 4296 powershell.exe Token: SeIncBasePriorityPrivilege 4296 powershell.exe Token: SeCreatePagefilePrivilege 4296 powershell.exe Token: SeBackupPrivilege 4296 powershell.exe Token: SeRestorePrivilege 4296 powershell.exe Token: SeShutdownPrivilege 4296 powershell.exe Token: SeDebugPrivilege 4296 powershell.exe Token: SeSystemEnvironmentPrivilege 4296 powershell.exe Token: SeRemoteShutdownPrivilege 4296 powershell.exe Token: SeUndockPrivilege 4296 powershell.exe Token: SeManageVolumePrivilege 4296 powershell.exe Token: 33 4296 powershell.exe Token: 34 4296 powershell.exe Token: 35 4296 powershell.exe Token: 36 4296 powershell.exe Token: SeDebugPrivilege 648 powershell.exe Token: SeIncreaseQuotaPrivilege 648 powershell.exe Token: SeSecurityPrivilege 648 powershell.exe Token: SeTakeOwnershipPrivilege 648 powershell.exe Token: SeLoadDriverPrivilege 648 powershell.exe Token: SeSystemProfilePrivilege 648 powershell.exe Token: SeSystemtimePrivilege 648 powershell.exe Token: SeProfSingleProcessPrivilege 648 powershell.exe Token: SeIncBasePriorityPrivilege 648 powershell.exe Token: SeCreatePagefilePrivilege 648 powershell.exe Token: SeBackupPrivilege 648 powershell.exe Token: SeRestorePrivilege 648 powershell.exe Token: SeShutdownPrivilege 648 powershell.exe Token: SeDebugPrivilege 648 powershell.exe Token: SeSystemEnvironmentPrivilege 648 powershell.exe Token: SeRemoteShutdownPrivilege 648 powershell.exe Token: SeUndockPrivilege 648 powershell.exe Token: SeManageVolumePrivilege 648 powershell.exe Token: 33 648 powershell.exe Token: 34 648 powershell.exe Token: 35 648 powershell.exe Token: 36 648 powershell.exe Token: SeDebugPrivilege 2176 powershell.exe Token: SeIncreaseQuotaPrivilege 2176 powershell.exe Token: SeSecurityPrivilege 2176 powershell.exe Token: SeTakeOwnershipPrivilege 2176 powershell.exe Token: SeLoadDriverPrivilege 2176 powershell.exe Token: SeSystemProfilePrivilege 2176 powershell.exe Token: SeSystemtimePrivilege 2176 powershell.exe Token: SeProfSingleProcessPrivilege 2176 powershell.exe Token: SeIncBasePriorityPrivilege 2176 powershell.exe Token: SeCreatePagefilePrivilege 2176 powershell.exe Token: SeBackupPrivilege 2176 powershell.exe Token: SeRestorePrivilege 2176 powershell.exe Token: SeShutdownPrivilege 2176 powershell.exe Token: SeDebugPrivilege 2176 powershell.exe Token: SeSystemEnvironmentPrivilege 2176 powershell.exe Token: SeRemoteShutdownPrivilege 2176 powershell.exe Token: SeUndockPrivilege 2176 powershell.exe Token: SeManageVolumePrivilege 2176 powershell.exe Token: 33 2176 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5092 Loader.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4296 5092 Loader.exe 72 PID 5092 wrote to memory of 4296 5092 Loader.exe 72 PID 5092 wrote to memory of 648 5092 Loader.exe 74 PID 5092 wrote to memory of 648 5092 Loader.exe 74 PID 5092 wrote to memory of 2176 5092 Loader.exe 76 PID 5092 wrote to memory of 2176 5092 Loader.exe 76 PID 5092 wrote to memory of 392 5092 Loader.exe 78 PID 5092 wrote to memory of 392 5092 Loader.exe 78 PID 5092 wrote to memory of 2408 5092 Loader.exe 80 PID 5092 wrote to memory of 2408 5092 Loader.exe 80 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Loader.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Loader.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XWorm Auto Updater'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XWorm Auto Updater'2⤵
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XWorm Auto Updater" /tr "C:\Users\Admin\AppData\Local\Temp\XWorm Auto Updater"2⤵
- Creates scheduled task(s)
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\XWorm Auto Updater"C:\Users\Admin\AppData\Local\Temp\XWorm Auto Updater"1⤵
- Executes dropped EXE
PID:4852
-
C:\Users\Admin\AppData\Local\Temp\XWorm Auto Updater"C:\Users\Admin\AppData\Local\Temp\XWorm Auto Updater"1⤵
- Executes dropped EXE
PID:4284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD516c5fce5f7230eea11598ec11ed42862
SHA175392d4824706090f5e8907eee1059349c927600
SHA25687ba77c13905298acbac72be90949c4fe0755b6eff9777615aa37f252515f151
SHA512153edd6da59beea6cc411ed7383c32916425d6ebb65f04c65aab7c1d6b25443d143aa8449aa92149de0ad8a975f6ecaa60f9f7574536eec6b38fe5fd3a6c6adc
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
1KB
MD51b7729a81ccc1dc1bc5e0a80daaee472
SHA1a836da0a784bcdec99a22b0dd253abde21d6cfe0
SHA2560047e8591b8f713d9e4a2ab1d62dee6d7f76758db27d75efcd0e8d4bc1bf2693
SHA512acbc7c083680d15eb21dc35d8da0982dd1c604026c11b3898481ccb1a68fbb34341acdc812698aee22a5bdc0f42596eaf9a6473324ed5a1b72e4b005f9f6437f
-
Filesize
1KB
MD52d2d46be85d7cda3932b29fa09dd9487
SHA19e193e835cee665480aa818bcdff24192f454f85
SHA25687a01d13bd690be381e88b0fe80638ff4865fafbcd315810da81e43cbedbe01d
SHA512c51b9dfac7a25c90bd23bcf3280ca677d07845408517dff168213986576a7006fa58dd43dc65777a9035c5492811884b9d9b2225c6b5125c32b733a95d5ba6cd
-
Filesize
1KB
MD5b48f12bf7a087878cde50d525389b454
SHA1655eef6151cdd8ec457835250e4da535632f4593
SHA256d489653e0466a94aa15bd806318ecb22fb919471f61ace25468a34de359ea11d
SHA512908835f0729cb66821bb60bdace5da2573d61fa74c0410a401f4947943118c9f861842285b887157aa61f8c584868967a7fce0f5ec74ea3aebc2f22226553a74
-
Filesize
133KB
MD5fc3378c4e8cd002ba1e8a05b37f09d24
SHA16b3620287c4f94d2f515c1a8577fffcc02331b0c
SHA2562b03faa10419218a0214b4ef415ecc41d9c78a8031deaf89d9d836b8fcd54089
SHA512c1ac224a9aad0dde67f5ec4b4ae9f4921cb7718bf1a27755d32de6ea04f8aaf09864228c0d576492bbd1742209333b988429a3e277b1f4d19ea068b1e548fe69
-
Filesize
133KB
MD5fc3378c4e8cd002ba1e8a05b37f09d24
SHA16b3620287c4f94d2f515c1a8577fffcc02331b0c
SHA2562b03faa10419218a0214b4ef415ecc41d9c78a8031deaf89d9d836b8fcd54089
SHA512c1ac224a9aad0dde67f5ec4b4ae9f4921cb7718bf1a27755d32de6ea04f8aaf09864228c0d576492bbd1742209333b988429a3e277b1f4d19ea068b1e548fe69
-
Filesize
133KB
MD5fc3378c4e8cd002ba1e8a05b37f09d24
SHA16b3620287c4f94d2f515c1a8577fffcc02331b0c
SHA2562b03faa10419218a0214b4ef415ecc41d9c78a8031deaf89d9d836b8fcd54089
SHA512c1ac224a9aad0dde67f5ec4b4ae9f4921cb7718bf1a27755d32de6ea04f8aaf09864228c0d576492bbd1742209333b988429a3e277b1f4d19ea068b1e548fe69
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a