Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 18:11
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240220-en
General
-
Target
XClient.exe
-
Size
67KB
-
MD5
c9cd80d55733208fc06b8b52cddb52dc
-
SHA1
6cc60302d90e7d7661b5b194fa954efacba19d49
-
SHA256
5fb96191ad7394700966c0854e3f1225b8b2989f528ce6993a747ff7a9cf2552
-
SHA512
befca56bfce924e50c11f9d702ab2d6a6e05d55cd4399c4ac37891c1d337a43d05060f5cb9a1600fc4c172f7816fad14bc02e0c8d44eb82b55f61da4812cd0aa
-
SSDEEP
1536:n5ydgkcoaOOTxMH/W0WybZYgmH2r2i6urYiZOenvefZ3:FVxMfwybZ4rYXZOewZ3
Malware Config
Extracted
xworm
silver-bowl.gl.at.ply.gg:29206
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1948-1-0x0000000000150000-0x0000000000168000-memory.dmp family_xworm -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2704 powershell.exe 2608 powershell.exe 2444 powershell.exe 2944 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\neglebase2003_2024-04-22-21-30-52_1713810652250.mp4 XClient.exe File opened for modification C:\Windows\neglebase2003_2024-04-22-21-30-52_1713810652250.mp4 vlc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 32 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Identifier csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Configuration Data csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Component Information csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\1\KeyboardController csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Component Information csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Configuration Data csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Component Information csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Identifier csrss.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ThemeActive = "1" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LoadedBefore = "1" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\DllName = "%SystemRoot%\\resources\\themes\\Aero\\Aero.msstyles" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ColorName = "NormalColor" winlogon.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\MuiCached\MachinePreferredUILanguages = 65006e002d00550053000000 winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastUserLangID = "1033" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastLoadedDPI = "96" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\SizeName = "NormalSize" winlogon.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ThemeManager winlogon.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2280 vlc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2704 powershell.exe 2608 powershell.exe 2444 powershell.exe 2944 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2280 vlc.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1948 XClient.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 2444 powershell.exe Token: SeDebugPrivilege 2944 powershell.exe Token: SeDebugPrivilege 1948 XClient.exe Token: 33 2280 vlc.exe Token: SeIncBasePriorityPrivilege 2280 vlc.exe Token: SeShutdownPrivilege 2216 LogonUI.exe Token: SeShutdownPrivilege 2216 LogonUI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe 2280 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2280 vlc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2704 1948 XClient.exe 29 PID 1948 wrote to memory of 2704 1948 XClient.exe 29 PID 1948 wrote to memory of 2704 1948 XClient.exe 29 PID 1948 wrote to memory of 2608 1948 XClient.exe 31 PID 1948 wrote to memory of 2608 1948 XClient.exe 31 PID 1948 wrote to memory of 2608 1948 XClient.exe 31 PID 1948 wrote to memory of 2444 1948 XClient.exe 33 PID 1948 wrote to memory of 2444 1948 XClient.exe 33 PID 1948 wrote to memory of 2444 1948 XClient.exe 33 PID 1948 wrote to memory of 2944 1948 XClient.exe 35 PID 1948 wrote to memory of 2944 1948 XClient.exe 35 PID 1948 wrote to memory of 2944 1948 XClient.exe 35 PID 1948 wrote to memory of 1292 1948 XClient.exe 40 PID 1948 wrote to memory of 1292 1948 XClient.exe 40 PID 1948 wrote to memory of 1292 1948 XClient.exe 40 PID 1292 wrote to memory of 2280 1292 cmd.exe 42 PID 1292 wrote to memory of 2280 1292 cmd.exe 42 PID 1292 wrote to memory of 2280 1292 cmd.exe 42 PID 1948 wrote to memory of 1864 1948 XClient.exe 44 PID 1948 wrote to memory of 1864 1948 XClient.exe 44 PID 1948 wrote to memory of 1864 1948 XClient.exe 44 PID 2708 wrote to memory of 2216 2708 csrss.exe 50 PID 2708 wrote to memory of 2216 2708 csrss.exe 50 PID 2596 wrote to memory of 2216 2596 winlogon.exe 50 PID 2596 wrote to memory of 2216 2596 winlogon.exe 50 PID 2596 wrote to memory of 2216 2596 winlogon.exe 50 PID 2708 wrote to memory of 2216 2708 csrss.exe 50 PID 2708 wrote to memory of 2216 2708 csrss.exe 50 PID 2708 wrote to memory of 2216 2708 csrss.exe 50 PID 2708 wrote to memory of 2216 2708 csrss.exe 50 PID 2708 wrote to memory of 2216 2708 csrss.exe 50 PID 2708 wrote to memory of 2216 2708 csrss.exe 50 PID 2708 wrote to memory of 2216 2708 csrss.exe 50 PID 2708 wrote to memory of 2216 2708 csrss.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Windows\neglebase2003_2024-04-22-21-30-52_1713810652250.mp4"2⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Windows\neglebase2003_2024-04-22-21-30-52_1713810652250.mp4"3⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2280
-
-
-
C:\Windows\system32\shutdown.exeshutdown.exe -L2⤵PID:1864
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1628
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2708
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SIOBV7WTGV5IMSML9U2B.temp
Filesize7KB
MD50d65d1f96059a1a75418b30ce756317f
SHA1552e3caaab94f85d5d2522d0dd7cbae98250236f
SHA256ceb0620be4bb34fc797cb0797203dcd07103678e8c70cd99970817c5298adb72
SHA512ea96f595792013a8ec2699481abfa04dc915b10dff873ca20f22131a87161a59ba41859e0f6978d12ec0e9bb2b0f614159bd5e857aece012c3c893621a2a936e
-
Filesize
3.9MB
MD5c9438e1e34c1d17b498118357d8bbf3b
SHA1abe971743646b7b3dfcd838023625ca4ce65e250
SHA2566cb9c3366de735f06857b2f9b61a42a8769f853bc26a30481c1e6251281a4d77
SHA512432f7d23b91bab5ab5022ffb6da634ceffe82cf63460c08db4832e78aba772a6c359016710b83a5d542f5c088349b36dc1d9315918088fe7c1118c56261fa44f