Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/02/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
Files To Use.exe
Resource
win7-20231215-en
General
-
Target
Files To Use.exe
-
Size
493KB
-
MD5
d110ec96448664160f10da4abd78152f
-
SHA1
128cdfec7390922d3c643717149f81f4af277cd1
-
SHA256
2fad8bf4e40ac2f1b7da870bb8e4c228bec5c52a875aadf347e71a9cba30d6bc
-
SHA512
e99ca079cb44b89e331693c975438f88efda629d7fd898535c511078ca82e07be3faa71bcf31e0657f428556990860f0879d76e23c89f4d9be91f8655cb0734f
-
SSDEEP
12288:PBdlwHRn+WlYV+9VeD09yIzj8ftZJIF+dHO:PBkVdlYATeDOyuj8VwFUHO
Malware Config
Extracted
xworm
3.1
fhfgthfghfg-34660.portmap.host:34660
-
Install_directory
%Userprofile%
-
install_file
Runtime Broker.exe
Extracted
umbral
https://discord.com/api/webhooks/1204944287041847307/aoa_S28cr8V4g11xswAZC9SdvRJS8ygczDK-GfItmMFXCcL2edroJI5lraSE-OISlf6d
Signatures
-
Detect Umbral payload 3 IoCs
resource yara_rule behavioral2/files/0x0006000000023202-36.dat family_umbral behavioral2/memory/3800-44-0x000001B230AC0000-0x000001B230B00000-memory.dmp family_umbral behavioral2/files/0x0006000000023202-43.dat family_umbral -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x0006000000023201-17.dat family_xworm behavioral2/memory/3944-28-0x0000000000600000-0x0000000000618000-memory.dmp family_xworm behavioral2/files/0x0007000000023207-188.dat family_xworm -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation idk.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation Umbral.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation XClient.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe -
Executes dropped EXE 6 IoCs
pid Process 404 idk.exe 3944 XClient.exe 1060 Umbral.exe 3800 Umbral.exe 4020 XClient.exe 404 XClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\XClient.exe" XClient.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\XClient.exe idk.exe File created C:\Windows\Umbral.exe Umbral.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2348 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4608 powershell.exe 3680 powershell.exe 4608 powershell.exe 3680 powershell.exe 904 powershell.exe 904 powershell.exe 4200 powershell.exe 4200 powershell.exe 2772 powershell.exe 2772 powershell.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeDebugPrivilege 3944 XClient.exe Token: SeDebugPrivilege 3800 Umbral.exe Token: SeDebugPrivilege 3680 powershell.exe Token: SeDebugPrivilege 4608 powershell.exe Token: SeIncreaseQuotaPrivilege 4088 wmic.exe Token: SeSecurityPrivilege 4088 wmic.exe Token: SeTakeOwnershipPrivilege 4088 wmic.exe Token: SeLoadDriverPrivilege 4088 wmic.exe Token: SeSystemProfilePrivilege 4088 wmic.exe Token: SeSystemtimePrivilege 4088 wmic.exe Token: SeProfSingleProcessPrivilege 4088 wmic.exe Token: SeIncBasePriorityPrivilege 4088 wmic.exe Token: SeCreatePagefilePrivilege 4088 wmic.exe Token: SeBackupPrivilege 4088 wmic.exe Token: SeRestorePrivilege 4088 wmic.exe Token: SeShutdownPrivilege 4088 wmic.exe Token: SeDebugPrivilege 4088 wmic.exe Token: SeSystemEnvironmentPrivilege 4088 wmic.exe Token: SeRemoteShutdownPrivilege 4088 wmic.exe Token: SeUndockPrivilege 4088 wmic.exe Token: SeManageVolumePrivilege 4088 wmic.exe Token: 33 4088 wmic.exe Token: 34 4088 wmic.exe Token: 35 4088 wmic.exe Token: 36 4088 wmic.exe Token: SeIncreaseQuotaPrivilege 4088 wmic.exe Token: SeSecurityPrivilege 4088 wmic.exe Token: SeTakeOwnershipPrivilege 4088 wmic.exe Token: SeLoadDriverPrivilege 4088 wmic.exe Token: SeSystemProfilePrivilege 4088 wmic.exe Token: SeSystemtimePrivilege 4088 wmic.exe Token: SeProfSingleProcessPrivilege 4088 wmic.exe Token: SeIncBasePriorityPrivilege 4088 wmic.exe Token: SeCreatePagefilePrivilege 4088 wmic.exe Token: SeBackupPrivilege 4088 wmic.exe Token: SeRestorePrivilege 4088 wmic.exe Token: SeShutdownPrivilege 4088 wmic.exe Token: SeDebugPrivilege 4088 wmic.exe Token: SeSystemEnvironmentPrivilege 4088 wmic.exe Token: SeRemoteShutdownPrivilege 4088 wmic.exe Token: SeUndockPrivilege 4088 wmic.exe Token: SeManageVolumePrivilege 4088 wmic.exe Token: 33 4088 wmic.exe Token: 34 4088 wmic.exe Token: 35 4088 wmic.exe Token: 36 4088 wmic.exe Token: SeDebugPrivilege 904 powershell.exe Token: SeDebugPrivilege 4200 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 3944 XClient.exe Token: SeDebugPrivilege 4020 XClient.exe Token: SeDebugPrivilege 404 XClient.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2348 wrote to memory of 404 2348 schtasks.exe 85 PID 2348 wrote to memory of 404 2348 schtasks.exe 85 PID 2348 wrote to memory of 404 2348 schtasks.exe 85 PID 404 wrote to memory of 4608 404 idk.exe 87 PID 404 wrote to memory of 4608 404 idk.exe 87 PID 404 wrote to memory of 4608 404 idk.exe 87 PID 404 wrote to memory of 3944 404 idk.exe 89 PID 404 wrote to memory of 3944 404 idk.exe 89 PID 2348 wrote to memory of 1060 2348 schtasks.exe 90 PID 2348 wrote to memory of 1060 2348 schtasks.exe 90 PID 2348 wrote to memory of 1060 2348 schtasks.exe 90 PID 1060 wrote to memory of 3680 1060 Umbral.exe 91 PID 1060 wrote to memory of 3680 1060 Umbral.exe 91 PID 1060 wrote to memory of 3680 1060 Umbral.exe 91 PID 1060 wrote to memory of 3800 1060 Umbral.exe 93 PID 1060 wrote to memory of 3800 1060 Umbral.exe 93 PID 3800 wrote to memory of 4088 3800 Umbral.exe 94 PID 3800 wrote to memory of 4088 3800 Umbral.exe 94 PID 3944 wrote to memory of 904 3944 XClient.exe 97 PID 3944 wrote to memory of 904 3944 XClient.exe 97 PID 3944 wrote to memory of 4200 3944 XClient.exe 100 PID 3944 wrote to memory of 4200 3944 XClient.exe 100 PID 3944 wrote to memory of 2772 3944 XClient.exe 102 PID 3944 wrote to memory of 2772 3944 XClient.exe 102 PID 3944 wrote to memory of 2348 3944 XClient.exe 105 PID 3944 wrote to memory of 2348 3944 XClient.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Files To Use.exe"C:\Users\Admin\AppData\Local\Temp\Files To Use.exe"1⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\idk.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\idk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHYAeABlACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHQAYwBlACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHgAaQB5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGsAdQBrACMAPgA="3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\XClient.exe"C:\Windows\XClient.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\XClient.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\XClient.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\XClient.exe"4⤵
- Creates scheduled task(s)
- Suspicious use of WriteProcessMemory
PID:2348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Umbral.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAaAB2ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGoAZgB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHUAdQBhACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AagB3ACMAPgA="3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\Umbral.exe"C:\Windows\Umbral.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
-
-
C:\Users\Admin\XClient.exeC:\Users\Admin\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
C:\Users\Admin\XClient.exeC:\Users\Admin\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
1KB
MD5adcf7694324db40696dec9e7145c7d9a
SHA16a5a093f6fec740444de5c219fd6af57f087d436
SHA256b7678468701b0c13267926de54a86f833541a6d0420e466d62d1fa948bbfe054
SHA512b5ad97789767fe51c37b603b3ec7015008a69699115330404193ceebb3158d5ae674062699b9cb62fa5635a7e78330d952e4438176bd9612d50c424845fb6896
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
18KB
MD538aa30688c50d72c6506c733278746f5
SHA12b30db437d68001853a3c7e27d11dae996ece744
SHA2561ce55f3fc0426f82e41ea451f0f08512e879b060a094c93f93fe2c6a1c764e31
SHA512c73c3bc5b543c98e903372e4b7ed2dfec7a9d71d2caba9987eaa869774ed0c5f8596b1306047d7683310f52e63b109ad0e94afeb2a7b3a8af40bddf36751cd1f
-
Filesize
944B
MD5e3161f4edbc9b963debe22e29658050b
SHA145dbf88dadafe5dd1cfee1e987c8a219d3208cdb
SHA2561359d6daeaed2f254b162914203c891b23139cc236a3bf75c2dfcbe26265c84a
SHA512006ffb8f37d1f77f8ee79b22ffa413819f565d62773c632b70985759572121c6ab4743139d16d885f8c0ff9d0e0b136686741728b3e142ee54aea3bb733dffb2
-
Filesize
239KB
MD563a373c7a48ef4b85579d498388bacca
SHA1c8b2f34ad29df1b4f7319ed62c718d9195cc2a1a
SHA256bd4ace88c87bfae2a0be0943f2d7cbc7abe9f940fb426d07e46001d9f614d6d7
SHA512a9be9b671a8305c0d63e2467643ce5dd0d65b34e834ea78155fdf80745e8da85c5587813176c1f559f9e180a46a595dfbf8de029e8f0ff3cad77fae95f461dcf
-
Filesize
79KB
MD5824955d7d5e92b99feee38b38315e3d6
SHA12afc235f7c0efc4148ff1b374104d694559ea5f6
SHA2567aa0041265c558f803a761a2a0acb80979751546520cd89586c1c069e79741eb
SHA512dd5ad749e5fdc63ecbf6530926f37452129b79a61e1266d0a7e10c1d4b883f461c39f282e2815f1f078fa233acc132d797469caae85f73807db196f3f9c0a94e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
66KB
MD5920b6392fa3b01c6347b94ebbdafbeeb
SHA1cc45c7ae43c3a015a4fe436f615fb461417d7c88
SHA2564bdcbcdb9ffe40e278301d9912d31f742dbe7117c7bb4d71d2cd64281b83d9fa
SHA512b89e565122d39c61cda07653121146fd3eca021dd2a14ecc8723c64f650b37467e2efb31835508e198df47498c96314f99bd8637ae1ffae5e27d2229a1915ee6
-
Filesize
232KB
MD52483d9350df5eedfbf7de1d5f5b5ed4f
SHA1724476e281551b918aa913eef34b3cc78b3b0fba
SHA256d9d1f6f62443d226c14762e891663a56d20257512a56b3b139d6b8b151333902
SHA512decfaddad857c5b540bbce3b732eee4b2d14e05fca44bf06204d83cd59d5dc370e8186ac858ab6a2e9b6592fa0114e96f5fc939d33643bceb0e3042290cbc588
-
Filesize
216KB
MD5c7112952dc859015525dbf100a7c625e
SHA130cdda3546aefa856cfbbdbabbb42224a9cbe9c5
SHA256e6c24330debad15ea35bae3ad481a2d6a7b5442327587d500e977c215bcb6ed6
SHA512007029817f60dd5d7b2635f6e14e0e9a469170715c046231bb1a583a8be950a7709ebc3481622c53684a2e7b99516c2cb88234544c6167e2d7bdef18e8991b5b
-
Filesize
74KB
MD5a15a8f6157c41ab4fa9ee326f3d97f50
SHA1e6b3b8c5545203d417028cf0bc3d6ac52019ab03
SHA25690762c84491981a3732f8a7953148ad833a13bc029b641483476089ac0b4bd7f
SHA51286b190956b936be0540e725bcfe3623ed00c63ea9ef5317e571e5b85681a830c3f42e4b9251840818cd66241471c5d3a40137d9d1da969495ee873d16207e2c6