Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 22:16
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20231215-en
General
-
Target
XClient.exe
-
Size
33KB
-
MD5
6a0dd7035dd8b214bc0e89abac86965b
-
SHA1
bc37b9bd002d6e10e7922992d6c5cdd636f9820e
-
SHA256
10893249600c494365edddc0bcca1b6bf5012f777cb375cd529972a0f94e9fa7
-
SHA512
713a8515ed9f1ab509317593ac7b0b793af62b78a8d744bc532332d07f735b017e260872a1d0b77af14a1f753bd15c121d52a6a09f293f0e322f6313aec28216
-
SSDEEP
768:3dKk9oVQUzoxVJt76NHRVFr9jcaIOjhBbS:NKD/y97QHDFr9jOOjve
Malware Config
Extracted
xworm
5.0
127.0.0.1:23638
209.25.140.1:5525:23638
bring-recorder.gl.at.ply.gg:23638
action-yesterday.gl.at.ply.gg:23638
147.185.221.19:23638
then-wheel.gl.at.ply.gg::23638
then-wheel.gl.at.ply.gg:23638
teen-modes.gl.at.ply.gg:23638
LbSpssCFgm7ibxmv
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2784-0-0x0000000000E40000-0x0000000000E4E000-memory.dmp family_xworm -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b6fae8cb8ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{148A52E1-F6BF-11EE-8178-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000c68618aec8cdf840be327cb259b7a9eb70767592167e3335ab26f454905db8e5000000000e800000000200002000000020236d0b110d2feff0c65efabedf6161fef31308c20f31e5450952474f5045dd20000000c6a6714f667a3804451c34b671e38a6960ed73e97bb58934850e1a77b03c2b5840000000f545f08db135211ee26fd971cff2d952d1edddedd25a09d1bddb59818b28a5a962057eb3da7bda0849147ff279f2eec08731207d9417aeeb846cfdeee6653eab iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 XClient.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 452 iexplore.exe 452 iexplore.exe 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2784 wrote to memory of 452 2784 XClient.exe 31 PID 2784 wrote to memory of 452 2784 XClient.exe 31 PID 2784 wrote to memory of 452 2784 XClient.exe 31 PID 452 wrote to memory of 2044 452 iexplore.exe 34 PID 452 wrote to memory of 2044 452 iexplore.exe 34 PID 452 wrote to memory of 2044 452 iexplore.exe 34 PID 452 wrote to memory of 2044 452 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\How To Decrypt My Files.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:452 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5994e7827a974eca39d61d15a3b5e3035
SHA1d97b3f489d7057c643d0276e25cb1bdf59ebb86f
SHA25632bdcd82d4aef32f55a402a50c7c6f0f0a4a7037dae21d8f15a2c9ab9aa6236f
SHA5120be99d3f3c7f3e1d616f83402945a3eec0e77183cd0ab1446e9141225bd626f20fe440779bc753d4c161192d9d6cb1f2fd7cca83ef7fda97262c2b97dde5002c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4823e73fd33fa70876243b1ff911828
SHA1896fea67c3103eacab8215419be3f89d9ff5d547
SHA256155a4d70509d6e7c2a18711c09903e2019c426dd307739574a4efe25571eb946
SHA51294e169edfb9169345e1afac78cda78c7ad66c29fe2d11f542e39be82b79ea8bee8d2fff9aa5cd73707324688b4d7bb6f2f411019bceff8057a71956582904a18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aea5225930e58fd358ecedc9ca16d7ca
SHA16f2ed8dfe3f85d086b1d3b5b7d2ca2a7881cfaf6
SHA25640d6d4d4fc31345fe25e0d9f2aa56bef88a55a8a847b3ae304a21146a9c2d3bf
SHA5120ec79914bfe7e878e9580e5f3d004bcbbd6abfc12c31f298a39341515da4a8839f264c4ff2e1ab4abb53568f159ffae1fe949dd5880b04540b9ef50128613e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3c51741ceca3137a55c442d9cbb73e5
SHA1504dc36bdbbb7a0b6bb2cfcfd3e21e94403eb796
SHA256da6cda60e64fe8d7938f01a4c6840ec9756d434ae15e25b06a42174357a6f5ff
SHA512844615aaa66ad14306ecf1504779bea1bd50efc91f77200bdcd63796845a9981f9333ce2e1c0f79f5c231a4b71e6cd5524f5a3e490478bb02ea0ab2dacb0c239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51899e077a7193103ceddecd48e75abe4
SHA1fca360cb6a46b2bf2b580691b720f490d9193720
SHA256f3ab89f5ecfeaf10f92fad7f36066a29ecf84b02a7f1fa08ec2c1b83dc7bb028
SHA512d421eeb012bb181e8df1eede27caca9560119f6755433e9c0ec44b0338ac40a8ecb5267682f57202affad98d05738b50afdd5719a6b58c72ef0b63920b21726a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f029061672b919be316be659d95f2d07
SHA1fc75e7bd48cdfabfe5b8af0fddf578d0580bbc04
SHA256e74f1b66c7096a470b06f540014a70d2d67bbc3b1555c3e6fed19e204a60920c
SHA5127e91da148872d39d4bda2add24e802db5b6ea23ed46aec5967022c03b7913e36ae49003c27f7c4e4c7f8ba617a6b25559b745d2086068af4a50530abddc434ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57839598a344ac99e544fd8ddcd09ba27
SHA1ad266a7884cf0ee476b05ff99b8e7c671a2a722b
SHA256bb022c714afff2c87aa7c04ec208d889556cb5142e90b8db9f81962e3ea05e02
SHA5124d09b21319f67079ae1f505c78c9e11178b82a26d5c5d57fc45120d30008169bb47795351f24ac605ec0f1147c6cdfcd47e9aa05a021b8527e848f32ef4b3070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2035f87db6e12d7d1e7d1b4ca25ea4b
SHA12e53dcd05d1f9a2b1ac9531a1c5efa22f7a79fad
SHA2564ade35f202bcd7571d9b13cb65ef2c634c56e3404c5e1fb8e87e666a01e6d270
SHA5122b9363cca2247507ebb76a861c7ec2a7d7a53d74e78f5b4eab63fb1db53919702cd6a5dff2ee8ac2ef037bfa5b075e663b3249ff087c8bb9218878aec4e4002f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
633B
MD5eefbd5b610a3d9b60fceb6195982e523
SHA13089afe1027e03e1e114af21d1e1ed3a4394630d
SHA2562b83723e038cbaee0a9db8e68b460c30435ede36ca5114272a8bd779aa3e6a78
SHA5120d4d973ff20d852bb73fee3e31df69166be555490d520f9384ea1bb6af36758575f5f5536a8626e84d1cc785f83003601d2976901c819e9afaf44abb4d4296e7
-
C:\Users\Admin\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000001.regtrans-ms.ENC
Filesize16B
MD53da7dfbd6c9e11b4d8dd5adb76c9a987
SHA1cdd4cf0d8e5d5656d1e47308835268c1c27f5567
SHA2564c00b7f2eac4df1134d965618429bf66e981bca09974e14e6447bdc269f51f40
SHA512107e23de41fd6863fc639cdd2157c9b7df51f2daa38bfb9e28c45e00366b1904121192b1a5f0a73eaed1941fc5c96beb5b81d9c94af71f3983933e6f89928d31