Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 03:08
Behavioral task
behavioral1
Sample
z84jxn2.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
z84jxn2.rar
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
z842jxn2/z872jxn2.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
z842jxn2/z872jxn2.exe
Resource
win10v2004-20240412-en
General
-
Target
z842jxn2/z872jxn2.exe
-
Size
69KB
-
MD5
96d20619f6fca9f8ce04ee826bd49a1a
-
SHA1
bbbb18c9c4a38dad5ce8cdc4dfc7bced7fa545e7
-
SHA256
8df2b4dae2428156b659ae3e080ee5bbb71ef51c26eb90341b23ebce1217ac48
-
SHA512
e21ef50bb1a94005ad42047c4f4ecafc5eaf56ff0ca682d79acaa885ed1f50cd1666ac98e7f111ab8879e8957ca982d2143613a12ae554308287cea901da8dca
-
SSDEEP
1536:4piY3bmV6IfVQitW8n8aWPbQ40UqlSIgg6vgaOgy6x3c:uV3bmrfVQitX0bQ43IgROgy65c
Malware Config
Extracted
xworm
195.35.2.168:7000
86.29.59.189:7000
72.59.79.119:7000
52.12.52.167:7000
16.39.62.122:7000
-
Install_directory
%Public%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7082635030:AAGxz6qjNlJ3WqLSL0ZicFOCA9YHE32yRzQ/sendMessage?chat_id=6484754327
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral3/memory/2416-0-0x00000000003A0000-0x00000000003B8000-memory.dmp family_xworm behavioral3/files/0x000c000000012252-57.dat family_xworm behavioral3/memory/1380-59-0x00000000012A0000-0x00000000012B8000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FileExplore.lnk z872jxn2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FileExplore.lnk z872jxn2.exe -
Executes dropped EXE 2 IoCs
pid Process 1380 FileExplore 2252 FileExplore -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\FileExplore = "C:\\Users\\Public\\FileExplore" z872jxn2.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2520 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2416 z872jxn2.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2672 powershell.exe 2476 powershell.exe 2572 powershell.exe 2920 powershell.exe 2416 z872jxn2.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2416 z872jxn2.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 2416 z872jxn2.exe Token: SeDebugPrivilege 1380 FileExplore Token: SeDebugPrivilege 2252 FileExplore -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2416 z872jxn2.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2672 2416 z872jxn2.exe 29 PID 2416 wrote to memory of 2672 2416 z872jxn2.exe 29 PID 2416 wrote to memory of 2672 2416 z872jxn2.exe 29 PID 2416 wrote to memory of 2476 2416 z872jxn2.exe 31 PID 2416 wrote to memory of 2476 2416 z872jxn2.exe 31 PID 2416 wrote to memory of 2476 2416 z872jxn2.exe 31 PID 2416 wrote to memory of 2572 2416 z872jxn2.exe 33 PID 2416 wrote to memory of 2572 2416 z872jxn2.exe 33 PID 2416 wrote to memory of 2572 2416 z872jxn2.exe 33 PID 2416 wrote to memory of 2920 2416 z872jxn2.exe 35 PID 2416 wrote to memory of 2920 2416 z872jxn2.exe 35 PID 2416 wrote to memory of 2920 2416 z872jxn2.exe 35 PID 2416 wrote to memory of 2520 2416 z872jxn2.exe 37 PID 2416 wrote to memory of 2520 2416 z872jxn2.exe 37 PID 2416 wrote to memory of 2520 2416 z872jxn2.exe 37 PID 336 wrote to memory of 1380 336 taskeng.exe 42 PID 336 wrote to memory of 1380 336 taskeng.exe 42 PID 336 wrote to memory of 1380 336 taskeng.exe 42 PID 336 wrote to memory of 2252 336 taskeng.exe 43 PID 336 wrote to memory of 2252 336 taskeng.exe 43 PID 336 wrote to memory of 2252 336 taskeng.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\z842jxn2\z872jxn2.exe"C:\Users\Admin\AppData\Local\Temp\z842jxn2\z872jxn2.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\z842jxn2\z872jxn2.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'z872jxn2.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\FileExplore'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FileExplore'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FileExplore" /tr "C:\Users\Public\FileExplore"2⤵
- Creates scheduled task(s)
PID:2520
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9ABDC104-6A83-4C92-BFE8-AFD794230E04} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Public\FileExploreC:\Users\Public\FileExplore2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Users\Public\FileExploreC:\Users\Public\FileExplore2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD51e42f64f1a358b3d5f1728c24898ae8e
SHA195381548a4a8226ff57ef2956ed082b1f78095db
SHA256ecf066d85c9dcb5ea56047e748642fca74f4d1f6d4bee9b37cf88b694d84a5a3
SHA51270df0e57f40ec6b3cb813af1353e4f60f029c48f65e5db389675924f138fadf6ec7c2cf8f5fbaa76172b21bf7ec031c01c0785b5cfdc18ecf25b91df8283051e
-
Filesize
69KB
MD596d20619f6fca9f8ce04ee826bd49a1a
SHA1bbbb18c9c4a38dad5ce8cdc4dfc7bced7fa545e7
SHA2568df2b4dae2428156b659ae3e080ee5bbb71ef51c26eb90341b23ebce1217ac48
SHA512e21ef50bb1a94005ad42047c4f4ecafc5eaf56ff0ca682d79acaa885ed1f50cd1666ac98e7f111ab8879e8957ca982d2143613a12ae554308287cea901da8dca