Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10App.exe
windows7-x64
7App.exe
windows10-2004-x64
7Freemasonry (2).exe
windows7-x64
10Freemasonry (2).exe
windows10-2004-x64
10Freemasonry.exe
windows7-x64
3Freemasonry.exe
windows10-2004-x64
7NisSrv.exe
windows7-x64
10NisSrv.exe
windows10-2004-x64
10Presentati...he.exe
windows7-x64
1Presentati...he.exe
windows10-2004-x64
10SecurityHe...2).exe
windows7-x64
10SecurityHe...2).exe
windows10-2004-x64
10SessionService.exe
windows7-x64
10SessionService.exe
windows10-2004-x64
10SgrmBroker.exe
windows7-x64
10SgrmBroker.exe
windows10-2004-x64
10SocketHeciServer.exe
windows7-x64
10SocketHeciServer.exe
windows10-2004-x64
10cmd.exe
windows7-x64
10cmd.exe
windows10-2004-x64
10Analysis
-
max time kernel
60s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 09:05
Behavioral task
behavioral1
Sample
App.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
App.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Freemasonry (2).exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Freemasonry (2).exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Freemasonry.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Freemasonry.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
NisSrv.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
NisSrv.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
PresentationFontCache.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
PresentationFontCache.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
SecurityHealthService (2).exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
SecurityHealthService (2).exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
SessionService.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
SessionService.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
SgrmBroker.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
SgrmBroker.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
SocketHeciServer.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
SocketHeciServer.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
cmd.exe
Resource
win7-20231215-en
General
-
Target
SecurityHealthService (2).exe
-
Size
863KB
-
MD5
e52b5a8920cb3377b0b965cff2511976
-
SHA1
750741e2b260c02f0e0c1f0a556630fd65aa04e1
-
SHA256
817875231b62f3c9513a011b6d008592bb37178b07f163f3d517170516ea8c1b
-
SHA512
ee9f8702d46343eed8a5c3f3755967f20f3c844af608150a926152da0828c31708f585280c004a5615e08cf9742fb9089a728ecf4d9360e29b51d9bd78e8060b
-
SSDEEP
24576:+mKZ0BH6VpcusvRVl/1C+ZiBnonvsciQvtEMvqDYWiZuTrMnkcECTvNh:+f0BH3Zv93iBnqWZYtuTr4j
Malware Config
Extracted
xworm
3.1
-
install_file
game.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral12/files/0x000800000002322d-26.dat family_xworm behavioral12/memory/5020-27-0x0000022593E20000-0x0000022593E6E000-memory.dmp family_xworm behavioral12/memory/4332-54-0x000001B07E860000-0x000001B07E870000-memory.dmp family_xworm behavioral12/memory/5020-39-0x0000022595A70000-0x0000022595A82000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5020 created 620 5020 smss.exe 3 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation SecurityHealthService (2).exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sqlwriter.pif SecurityHealthService (2).exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sqlwriter.pif SecurityHealthService (2).exe -
Executes dropped EXE 1 IoCs
pid Process 5020 smss.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-WindowsUpdateClient%4Operational.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-BackgroundTaskInfrastructure%4Operational.evtx svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5020 set thread context of 4388 5020 smss.exe 575 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1196 powershell.exe 1196 Process not Found 5020 smss.exe 4332 smss.exe 4388 smss.exe 4388 smss.exe 4332 smss.exe 4388 smss.exe 4388 smss.exe 4972 smss.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 4196 Process not Found 3000 Process not Found 4252 Process not Found 872 Process not Found 3532 Process not Found 4024 Process not Found 2120 Process not Found 648 Process not Found 4384 Process not Found 528 Process not Found 3268 Process not Found 3696 Process not Found 3744 Process not Found 3136 Process not Found 3580 Process not Found 3252 Process not Found 948 Process not Found 3248 Process not Found 4420 Process not Found 4380 Process not Found 1800 Process not Found 1516 Process not Found 4484 Process not Found 4708 Process not Found 3652 Process not Found 4560 Process not Found 2112 Process not Found 4888 Process not Found 3108 Process not Found 4364 Process not Found 2104 Process not Found 1612 Process not Found 4160 Process not Found 4156 Process not Found 4336 Process not Found 1968 Process not Found 1840 Process not Found 1648 Process not Found 5012 Process not Found 3352 Process not Found 3516 Process not Found 4048 Process not Found 2388 Process not Found 4068 Process not Found 4392 Process not Found 3524 Process not Found 2624 Process not Found 1820 Process not Found 5100 Process not Found 1336 Process not Found 896 Process not Found 2004 Process not Found 2396 Process not Found 2420 Process not Found 3156 Process not Found 1796 Process not Found 2072 Process not Found 1348 Process not Found 3892 Process not Found 4052 Process not Found 3500 Process not Found 4860 Process not Found 3216 Process not Found 3900 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1196 powershell.exe Token: SeDebugPrivilege 5020 smss.exe Token: SeDebugPrivilege 5020 smss.exe Token: SeDebugPrivilege 4332 smss.exe Token: SeDebugPrivilege 4388 smss.exe Token: SeDebugPrivilege 4972 smss.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4452 wrote to memory of 1196 4452 SecurityHealthService (2).exe 83 PID 4452 wrote to memory of 1196 4452 SecurityHealthService (2).exe 83 PID 4452 wrote to memory of 5020 4452 SecurityHealthService (2).exe 577 PID 4452 wrote to memory of 5020 4452 SecurityHealthService (2).exe 577 PID 4452 wrote to memory of 4332 4452 SecurityHealthService (2).exe 479 PID 4452 wrote to memory of 4332 4452 SecurityHealthService (2).exe 479 PID 5020 wrote to memory of 4388 5020 smss.exe 575 PID 5020 wrote to memory of 4388 5020 smss.exe 575 PID 5020 wrote to memory of 4388 5020 smss.exe 575 PID 5020 wrote to memory of 4388 5020 smss.exe 575 PID 5020 wrote to memory of 4388 5020 smss.exe 575 PID 5020 wrote to memory of 4388 5020 smss.exe 575 PID 5020 wrote to memory of 4388 5020 smss.exe 575 PID 5020 wrote to memory of 4388 5020 smss.exe 575 PID 5020 wrote to memory of 4388 5020 smss.exe 575 PID 5020 wrote to memory of 4388 5020 smss.exe 575 PID 5020 wrote to memory of 4388 5020 smss.exe 575 PID 4388 wrote to memory of 620 4388 smss.exe 3 PID 4388 wrote to memory of 684 4388 smss.exe 1 PID 4388 wrote to memory of 952 4388 smss.exe 12 PID 684 wrote to memory of 2688 684 lsass.exe 48 PID 4388 wrote to memory of 384 4388 smss.exe 463 PID 684 wrote to memory of 2688 684 lsass.exe 48 PID 684 wrote to memory of 2688 684 lsass.exe 48 PID 684 wrote to memory of 2688 684 lsass.exe 48 PID 4388 wrote to memory of 496 4388 smss.exe 11 PID 684 wrote to memory of 2688 684 lsass.exe 48 PID 684 wrote to memory of 2688 684 lsass.exe 48 PID 684 wrote to memory of 2688 684 lsass.exe 48 PID 5020 wrote to memory of 4972 5020 smss.exe 654 PID 5020 wrote to memory of 4972 5020 smss.exe 654 PID 684 wrote to memory of 2688 684 lsass.exe 48 PID 684 wrote to memory of 2688 684 lsass.exe 48 PID 4388 wrote to memory of 664 4388 smss.exe 27 PID 4388 wrote to memory of 1048 4388 smss.exe 14 PID 4388 wrote to memory of 1064 4388 smss.exe 24 PID 684 wrote to memory of 2688 684 lsass.exe 48 PID 4388 wrote to memory of 1176 4388 smss.exe 20 PID 4388 wrote to memory of 1184 4388 smss.exe 15
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:684
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{794c6824-afcc-44e0-a062-a1f98d2c4cce}2⤵PID:4388
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1048
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
PID:1184
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:664
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\SecurityHealthService (2).exe"C:\Users\Admin\AppData\Local\Temp\SecurityHealthService (2).exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sqlwriter.pif'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sqlwriter.pif"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sqlwriter.pif"2⤵PID:5020
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sqlwriter.pif'3⤵PID:4972
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dwm.pif'2⤵PID:4332
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1628
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1828
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4448
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2672
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3200
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3008
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000178 000000841⤵PID:384
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000001ac 000000841⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000198 000000841⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4388
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000001a4 000000841⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5020
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000114 000000841⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD513e5260e039b147eeccccd0e4e68df21
SHA1882c8bfc8205ce8d216f82e3346bd4f494a87219
SHA256053467d5fec0ae72ff57512e1ce5289843f999da4e6cc55fcf883637961688fd
SHA5129f22f62a6c64c848c0ec588eb685b9bf26c9ca67c72870d56a7e38fa016b532ad3578347d2f5ba63addff547709db739fd2d1994b8c82e19575061d64d4c1c9a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
296KB
MD5a00574cdeaca49c3ac3e06df82085900
SHA1ab702747dcf9dc84876fbef8efe85aabaa6b5c61
SHA256d885201537d61e47e478ad598df977af89c4aaf52b3d6d2fd4ebdab713e36c90
SHA5128f65826392a623d765fc06171989bea9688f288bdbb1b89a2bda90f10e664fee01cb6933ff60b1bcf4ea27bba7bd53e77febe5ca4b36c0906a1aa3d7756f4b3d