Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/02/2024, 01:12

General

  • Target

    Files To Use.exe

  • Size

    493KB

  • MD5

    d110ec96448664160f10da4abd78152f

  • SHA1

    128cdfec7390922d3c643717149f81f4af277cd1

  • SHA256

    2fad8bf4e40ac2f1b7da870bb8e4c228bec5c52a875aadf347e71a9cba30d6bc

  • SHA512

    e99ca079cb44b89e331693c975438f88efda629d7fd898535c511078ca82e07be3faa71bcf31e0657f428556990860f0879d76e23c89f4d9be91f8655cb0734f

  • SSDEEP

    12288:PBdlwHRn+WlYV+9VeD09yIzj8ftZJIF+dHO:PBkVdlYATeDOyuj8VwFUHO

Malware Config

Extracted

Family

xworm

Version

3.1

C2

fhfgthfghfg-34660.portmap.host:34660

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    Runtime Broker.exe

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1204944287041847307/aoa_S28cr8V4g11xswAZC9SdvRJS8ygczDK-GfItmMFXCcL2edroJI5lraSE-OISlf6d

Signatures

  • Detect Umbral payload 3 IoCs
  • Detect Xworm Payload 3 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Files To Use.exe
    "C:\Users\Admin\AppData\Local\Temp\Files To Use.exe"
    1⤵
      PID:2348
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\idk.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\idk.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:404
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHYAeABlACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHQAYwBlACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHgAaQB5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGsAdQBrACMAPgA="
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4608
        • C:\Windows\XClient.exe
          "C:\Windows\XClient.exe"
          3⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3944
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\XClient.exe'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:904
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4200
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\XClient.exe'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2772
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\XClient.exe"
            4⤵
            • Creates scheduled task(s)
            • Suspicious use of WriteProcessMemory
            PID:2348
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Umbral.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Umbral.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1060
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAaAB2ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGoAZgB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHUAdQBhACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AagB3ACMAPgA="
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3680
        • C:\Windows\Umbral.exe
          "C:\Windows\Umbral.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3800
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic.exe" csproduct get uuid
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4088
    • C:\Users\Admin\XClient.exe
      C:\Users\Admin\XClient.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4020
    • C:\Users\Admin\XClient.exe
      C:\Users\Admin\XClient.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:404

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XClient.exe.log

      Filesize

      654B

      MD5

      2ff39f6c7249774be85fd60a8f9a245e

      SHA1

      684ff36b31aedc1e587c8496c02722c6698c1c4e

      SHA256

      e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

      SHA512

      1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      1KB

      MD5

      adcf7694324db40696dec9e7145c7d9a

      SHA1

      6a5a093f6fec740444de5c219fd6af57f087d436

      SHA256

      b7678468701b0c13267926de54a86f833541a6d0420e466d62d1fa948bbfe054

      SHA512

      b5ad97789767fe51c37b603b3ec7015008a69699115330404193ceebb3158d5ae674062699b9cb62fa5635a7e78330d952e4438176bd9612d50c424845fb6896

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      d28a889fd956d5cb3accfbaf1143eb6f

      SHA1

      157ba54b365341f8ff06707d996b3635da8446f7

      SHA256

      21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

      SHA512

      0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      38aa30688c50d72c6506c733278746f5

      SHA1

      2b30db437d68001853a3c7e27d11dae996ece744

      SHA256

      1ce55f3fc0426f82e41ea451f0f08512e879b060a094c93f93fe2c6a1c764e31

      SHA512

      c73c3bc5b543c98e903372e4b7ed2dfec7a9d71d2caba9987eaa869774ed0c5f8596b1306047d7683310f52e63b109ad0e94afeb2a7b3a8af40bddf36751cd1f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      e3161f4edbc9b963debe22e29658050b

      SHA1

      45dbf88dadafe5dd1cfee1e987c8a219d3208cdb

      SHA256

      1359d6daeaed2f254b162914203c891b23139cc236a3bf75c2dfcbe26265c84a

      SHA512

      006ffb8f37d1f77f8ee79b22ffa413819f565d62773c632b70985759572121c6ab4743139d16d885f8c0ff9d0e0b136686741728b3e142ee54aea3bb733dffb2

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Umbral.exe

      Filesize

      239KB

      MD5

      63a373c7a48ef4b85579d498388bacca

      SHA1

      c8b2f34ad29df1b4f7319ed62c718d9195cc2a1a

      SHA256

      bd4ace88c87bfae2a0be0943f2d7cbc7abe9f940fb426d07e46001d9f614d6d7

      SHA512

      a9be9b671a8305c0d63e2467643ce5dd0d65b34e834ea78155fdf80745e8da85c5587813176c1f559f9e180a46a595dfbf8de029e8f0ff3cad77fae95f461dcf

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\idk.exe

      Filesize

      79KB

      MD5

      824955d7d5e92b99feee38b38315e3d6

      SHA1

      2afc235f7c0efc4148ff1b374104d694559ea5f6

      SHA256

      7aa0041265c558f803a761a2a0acb80979751546520cd89586c1c069e79741eb

      SHA512

      dd5ad749e5fdc63ecbf6530926f37452129b79a61e1266d0a7e10c1d4b883f461c39f282e2815f1f078fa233acc132d797469caae85f73807db196f3f9c0a94e

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qezm2lov.fil.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\XClient.exe

      Filesize

      66KB

      MD5

      920b6392fa3b01c6347b94ebbdafbeeb

      SHA1

      cc45c7ae43c3a015a4fe436f615fb461417d7c88

      SHA256

      4bdcbcdb9ffe40e278301d9912d31f742dbe7117c7bb4d71d2cd64281b83d9fa

      SHA512

      b89e565122d39c61cda07653121146fd3eca021dd2a14ecc8723c64f650b37467e2efb31835508e198df47498c96314f99bd8637ae1ffae5e27d2229a1915ee6

    • C:\Windows\Umbral.exe

      Filesize

      232KB

      MD5

      2483d9350df5eedfbf7de1d5f5b5ed4f

      SHA1

      724476e281551b918aa913eef34b3cc78b3b0fba

      SHA256

      d9d1f6f62443d226c14762e891663a56d20257512a56b3b139d6b8b151333902

      SHA512

      decfaddad857c5b540bbce3b732eee4b2d14e05fca44bf06204d83cd59d5dc370e8186ac858ab6a2e9b6592fa0114e96f5fc939d33643bceb0e3042290cbc588

    • C:\Windows\Umbral.exe

      Filesize

      216KB

      MD5

      c7112952dc859015525dbf100a7c625e

      SHA1

      30cdda3546aefa856cfbbdbabbb42224a9cbe9c5

      SHA256

      e6c24330debad15ea35bae3ad481a2d6a7b5442327587d500e977c215bcb6ed6

      SHA512

      007029817f60dd5d7b2635f6e14e0e9a469170715c046231bb1a583a8be950a7709ebc3481622c53684a2e7b99516c2cb88234544c6167e2d7bdef18e8991b5b

    • C:\Windows\XClient.exe

      Filesize

      74KB

      MD5

      a15a8f6157c41ab4fa9ee326f3d97f50

      SHA1

      e6b3b8c5545203d417028cf0bc3d6ac52019ab03

      SHA256

      90762c84491981a3732f8a7953148ad833a13bc029b641483476089ac0b4bd7f

      SHA512

      86b190956b936be0540e725bcfe3623ed00c63ea9ef5317e571e5b85681a830c3f42e4b9251840818cd66241471c5d3a40137d9d1da969495ee873d16207e2c6

    • memory/404-195-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/904-113-0x000001CD130B0000-0x000001CD130C0000-memory.dmp

      Filesize

      64KB

    • memory/904-130-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/904-126-0x000001CD130B0000-0x000001CD130C0000-memory.dmp

      Filesize

      64KB

    • memory/904-110-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/904-123-0x000001CD2B860000-0x000001CD2B882000-memory.dmp

      Filesize

      136KB

    • memory/904-112-0x000001CD130B0000-0x000001CD130C0000-memory.dmp

      Filesize

      64KB

    • memory/2772-177-0x0000015EC84D0000-0x0000015EC84E0000-memory.dmp

      Filesize

      64KB

    • memory/2772-166-0x0000015EC84D0000-0x0000015EC84E0000-memory.dmp

      Filesize

      64KB

    • memory/2772-179-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/2772-165-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/3680-54-0x00000000732E0000-0x0000000073A90000-memory.dmp

      Filesize

      7.7MB

    • memory/3680-75-0x0000000006370000-0x00000000066C4000-memory.dmp

      Filesize

      3.3MB

    • memory/3680-163-0x00000000732E0000-0x0000000073A90000-memory.dmp

      Filesize

      7.7MB

    • memory/3680-79-0x00000000054B0000-0x00000000054C0000-memory.dmp

      Filesize

      64KB

    • memory/3680-84-0x0000000006EB0000-0x0000000006EE2000-memory.dmp

      Filesize

      200KB

    • memory/3680-96-0x00000000758C0000-0x000000007590C000-memory.dmp

      Filesize

      304KB

    • memory/3680-51-0x00000000054B0000-0x00000000054C0000-memory.dmp

      Filesize

      64KB

    • memory/3680-141-0x00000000054B0000-0x00000000054C0000-memory.dmp

      Filesize

      64KB

    • memory/3680-83-0x000000007F560000-0x000000007F570000-memory.dmp

      Filesize

      64KB

    • memory/3680-139-0x00000000732E0000-0x0000000073A90000-memory.dmp

      Filesize

      7.7MB

    • memory/3680-108-0x0000000008250000-0x00000000088CA000-memory.dmp

      Filesize

      6.5MB

    • memory/3680-136-0x0000000007F40000-0x0000000007F5A000-memory.dmp

      Filesize

      104KB

    • memory/3680-109-0x0000000007C80000-0x0000000007C8A000-memory.dmp

      Filesize

      40KB

    • memory/3680-53-0x0000000005910000-0x0000000005932000-memory.dmp

      Filesize

      136KB

    • memory/3680-77-0x0000000006930000-0x000000000697C000-memory.dmp

      Filesize

      304KB

    • memory/3680-111-0x0000000007EA0000-0x0000000007F36000-memory.dmp

      Filesize

      600KB

    • memory/3680-132-0x0000000007E60000-0x0000000007E74000-memory.dmp

      Filesize

      80KB

    • memory/3800-50-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/3800-81-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/3800-52-0x000001B24AF90000-0x000001B24AFA0000-memory.dmp

      Filesize

      64KB

    • memory/3800-44-0x000001B230AC0000-0x000001B230B00000-memory.dmp

      Filesize

      256KB

    • memory/3944-32-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/3944-28-0x0000000000600000-0x0000000000618000-memory.dmp

      Filesize

      96KB

    • memory/3944-78-0x000000001B360000-0x000000001B370000-memory.dmp

      Filesize

      64KB

    • memory/3944-125-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/3944-157-0x000000001B360000-0x000000001B370000-memory.dmp

      Filesize

      64KB

    • memory/4020-192-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/4020-190-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/4200-164-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/4200-152-0x0000025E18E70000-0x0000025E18E80000-memory.dmp

      Filesize

      64KB

    • memory/4200-140-0x0000025E18E70000-0x0000025E18E80000-memory.dmp

      Filesize

      64KB

    • memory/4200-155-0x0000025E18E70000-0x0000025E18E80000-memory.dmp

      Filesize

      64KB

    • memory/4200-137-0x00007FF9613A0000-0x00007FF961E61000-memory.dmp

      Filesize

      10.8MB

    • memory/4608-135-0x0000000002B00000-0x0000000002B10000-memory.dmp

      Filesize

      64KB

    • memory/4608-107-0x00000000072F0000-0x000000000730A000-memory.dmp

      Filesize

      104KB

    • memory/4608-102-0x00000000071F0000-0x0000000007293000-memory.dmp

      Filesize

      652KB

    • memory/4608-85-0x00000000758C0000-0x000000007590C000-memory.dmp

      Filesize

      304KB

    • memory/4608-138-0x0000000007570000-0x0000000007578000-memory.dmp

      Filesize

      32KB

    • memory/4608-156-0x00000000732E0000-0x0000000073A90000-memory.dmp

      Filesize

      7.7MB

    • memory/4608-134-0x0000000002B00000-0x0000000002B10000-memory.dmp

      Filesize

      64KB

    • memory/4608-82-0x000000007EFD0000-0x000000007EFE0000-memory.dmp

      Filesize

      64KB

    • memory/4608-49-0x0000000002B00000-0x0000000002B10000-memory.dmp

      Filesize

      64KB

    • memory/4608-95-0x0000000006580000-0x000000000659E000-memory.dmp

      Filesize

      120KB

    • memory/4608-76-0x0000000005FE0000-0x0000000005FFE000-memory.dmp

      Filesize

      120KB

    • memory/4608-47-0x0000000002B00000-0x0000000002B10000-memory.dmp

      Filesize

      64KB

    • memory/4608-48-0x00000000051A0000-0x00000000057C8000-memory.dmp

      Filesize

      6.2MB

    • memory/4608-46-0x00000000732E0000-0x0000000073A90000-memory.dmp

      Filesize

      7.7MB

    • memory/4608-124-0x00000000074F0000-0x0000000007501000-memory.dmp

      Filesize

      68KB

    • memory/4608-45-0x00000000029E0000-0x0000000002A16000-memory.dmp

      Filesize

      216KB

    • memory/4608-131-0x0000000007530000-0x000000000753E000-memory.dmp

      Filesize

      56KB

    • memory/4608-56-0x0000000005940000-0x00000000059A6000-memory.dmp

      Filesize

      408KB

    • memory/4608-127-0x00000000732E0000-0x0000000073A90000-memory.dmp

      Filesize

      7.7MB

    • memory/4608-55-0x00000000058D0000-0x0000000005936000-memory.dmp

      Filesize

      408KB