Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 04:55

General

  • Target

    WaveTrial.exe

  • Size

    86KB

  • MD5

    5cb8f4aa69339acc85ef9d2ca60b0c07

  • SHA1

    bb12de5f0a59eda98ba82e4a81dd24d80b8d7844

  • SHA256

    d8f968a5732220f35ab7094f13537d1d68405ed10362737848a87e5a71773e9d

  • SHA512

    f8908f96cfff0498b977c2d790709cc02408068999f520a9727e3eff4e260092fd1c1b8fcf13d0cc217298f0e91a0b55fb30f88bba515fa08ed8b66465c07540

  • SSDEEP

    1536:VVOy37Fk3kKmog7DldgQatSL4Jj6+l7lbOL5zWx1fRkTqP6nPbuE1ONz5UrQWSK0:ctmog7DjgfmmbO14CP3ONzCrQC0

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:2619

20.ip.gl.ply.gg:2619

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\WaveTrial.exe
    "C:\Users\Admin\AppData\Local\Temp\WaveTrial.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\WaveTrial.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2276
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WaveTrial.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2772
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\WaveLauncher'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2756
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WaveLauncher'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2664
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WaveLauncher" /tr "C:\Users\Admin\AppData\Roaming\WaveLauncher"
      2⤵
      • Creates scheduled task(s)
      PID:3032
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {E58E6D2D-C23A-4C4C-8DE7-D65644813C8B} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Roaming\WaveLauncher
      C:\Users\Admin\AppData\Roaming\WaveLauncher
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1964
    • C:\Users\Admin\AppData\Roaming\WaveLauncher
      C:\Users\Admin\AppData\Roaming\WaveLauncher
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    1c79af53478cf007878e7b6ee72d295c

    SHA1

    319113fa6df2ed41cccfd8947fa6d15990fde471

    SHA256

    406494a001e1b360f25b255b0236c4a7c6488815b084732f2edb95214a025ecd

    SHA512

    dd9310d6f2a03966c22179b645b37524c7f0d1743a54da18db650da7bd68f5158fa280c1bb166de7fb7088ac1f561fdae412e4382de44856a9bb0ee23e13e27b

  • C:\Users\Admin\AppData\Roaming\WaveLauncher

    Filesize

    86KB

    MD5

    5cb8f4aa69339acc85ef9d2ca60b0c07

    SHA1

    bb12de5f0a59eda98ba82e4a81dd24d80b8d7844

    SHA256

    d8f968a5732220f35ab7094f13537d1d68405ed10362737848a87e5a71773e9d

    SHA512

    f8908f96cfff0498b977c2d790709cc02408068999f520a9727e3eff4e260092fd1c1b8fcf13d0cc217298f0e91a0b55fb30f88bba515fa08ed8b66465c07540

  • memory/1964-35-0x00000000000A0000-0x00000000000BC000-memory.dmp

    Filesize

    112KB

  • memory/2172-30-0x000007FEF5F03000-0x000007FEF5F04000-memory.dmp

    Filesize

    4KB

  • memory/2172-1-0x00000000002C0000-0x00000000002DC000-memory.dmp

    Filesize

    112KB

  • memory/2172-39-0x0000000002120000-0x000000000212C000-memory.dmp

    Filesize

    48KB

  • memory/2172-0-0x000007FEF5F03000-0x000007FEF5F04000-memory.dmp

    Filesize

    4KB

  • memory/2172-31-0x000000001A880000-0x000000001A900000-memory.dmp

    Filesize

    512KB

  • memory/2172-29-0x000000001A880000-0x000000001A900000-memory.dmp

    Filesize

    512KB

  • memory/2276-7-0x000000001B360000-0x000000001B642000-memory.dmp

    Filesize

    2.9MB

  • memory/2276-8-0x00000000024E0000-0x00000000024E8000-memory.dmp

    Filesize

    32KB

  • memory/2276-6-0x00000000029D0000-0x0000000002A50000-memory.dmp

    Filesize

    512KB

  • memory/2772-15-0x0000000002490000-0x0000000002498000-memory.dmp

    Filesize

    32KB

  • memory/2772-14-0x000000001B330000-0x000000001B612000-memory.dmp

    Filesize

    2.9MB

  • memory/2776-38-0x0000000001270000-0x000000000128C000-memory.dmp

    Filesize

    112KB