Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
359s -
max time network
363s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 04:55
General
-
Target
Setup.exe
-
Size
136KB
-
MD5
2490778321cefd83508ba9786b66c217
-
SHA1
aa968d4fed3451a2fff03208e2815a5f342db167
-
SHA256
989c54ab290e147aba6de1e542eb71cdbc50179dffc190ca46031ce8f18a6c8b
-
SHA512
b5f46764e5d4ddb9eeb783f96356eabc9c5590abf36ee4554fd3bf1118220a9d24d78ef8d1187fa69505b0dc857606c81d2ce852ae74a59a883742ad551e5553
-
SSDEEP
3072:cpOFIFK9WFOM3Bz65/M6If+3Js+3JFkKeTni:co0K9YxBt25
Malware Config
Extracted
xworm
5.0
127.0.0.1:65129
0.tcp.eu.ngrok.io:18780:65129
0.tcp.eu.ngrok.io:65129
kitchen-minds.gl.at.ply.gg:65129
Xr8BqboocnOuliE1
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1708-1-0x0000000001080000-0x00000000010A8000-memory.dmp family_xworm -
Deletes itself 1 IoCs
pid Process 2448 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk Setup.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2836 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1708 Setup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1708 Setup.exe Token: SeDebugPrivilege 1708 Setup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 Setup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2448 1708 Setup.exe 31 PID 1708 wrote to memory of 2448 1708 Setup.exe 31 PID 1708 wrote to memory of 2448 1708 Setup.exe 31 PID 2448 wrote to memory of 2836 2448 cmd.exe 33 PID 2448 wrote to memory of 2836 2448 cmd.exe 33 PID 2448 wrote to memory of 2836 2448 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1B6.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD587ccfd5ecfcb7d886407a37ad44b61ba
SHA12352bcae1353a3b584c07a19db4af36559c26bf3
SHA256b4d8519320af8fd24c4b905c92d6044dbedbc746a1fd0e07e6328b4620b57de8
SHA512453d5819701e99335ea0252b5c0336b9fdec2f25a9b96660abc460cd69a1f5384769b0c80e5c7db5ec2b799b83352959ea11cf409929f83b44306a1a8f3f4f6f