Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 09:05
Behavioral task
behavioral1
Sample
PanelExecutorV9.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
PanelExecutorV9.exe
Resource
win10v2004-20240704-en
General
-
Target
PanelExecutorV9.exe
-
Size
67KB
-
MD5
5b349257f829bcea74f13e36526eaee7
-
SHA1
818fb201c0c7064ecf0d297d9aa636187219045a
-
SHA256
69bb4ee4cbbc3db5659dc6fb84da71be308f5ffe1d1a1474b68ef0c9cdfb93ef
-
SHA512
9bed76416df1293017a7481f5864f4ffa3f06348d41a0c88c505ded6287e95cec4be3856fdf3664d3b91c9a39a5e7b2408b9112bae134832f7570bc80566a09e
-
SSDEEP
1536:XRx7QqhjHuecnhQmISPMEUtHPApSTuCb/T2Xq6/oil6EORlNQn1YGqJ:XRx7QqhjH+hQc0EUCpST7b7GzORlNQ6t
Malware Config
Extracted
xworm
127.0.0.1:7777
192.168.100.36:7777
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2148-1-0x0000000000A80000-0x0000000000A96000-memory.dmp family_xworm behavioral1/files/0x000a00000001600d-34.dat family_xworm behavioral1/memory/1672-36-0x0000000000A40000-0x0000000000A56000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 756 powershell.exe 2828 powershell.exe 3060 powershell.exe 2636 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PanelExecutorV9.lnk PanelExecutorV9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PanelExecutorV9.lnk PanelExecutorV9.exe -
Executes dropped EXE 2 IoCs
pid Process 1672 PanelExecutorV9 680 PanelExecutorV9 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\PanelExecutorV9 = "C:\\ProgramData\\PanelExecutorV9" PanelExecutorV9.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2064 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 756 powershell.exe 2828 powershell.exe 3060 powershell.exe 2636 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2148 PanelExecutorV9.exe Token: SeDebugPrivilege 756 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 3060 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 2148 PanelExecutorV9.exe Token: SeDebugPrivilege 1672 PanelExecutorV9 Token: SeDebugPrivilege 680 PanelExecutorV9 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2148 wrote to memory of 756 2148 PanelExecutorV9.exe 32 PID 2148 wrote to memory of 756 2148 PanelExecutorV9.exe 32 PID 2148 wrote to memory of 756 2148 PanelExecutorV9.exe 32 PID 2148 wrote to memory of 2828 2148 PanelExecutorV9.exe 34 PID 2148 wrote to memory of 2828 2148 PanelExecutorV9.exe 34 PID 2148 wrote to memory of 2828 2148 PanelExecutorV9.exe 34 PID 2148 wrote to memory of 3060 2148 PanelExecutorV9.exe 36 PID 2148 wrote to memory of 3060 2148 PanelExecutorV9.exe 36 PID 2148 wrote to memory of 3060 2148 PanelExecutorV9.exe 36 PID 2148 wrote to memory of 2636 2148 PanelExecutorV9.exe 38 PID 2148 wrote to memory of 2636 2148 PanelExecutorV9.exe 38 PID 2148 wrote to memory of 2636 2148 PanelExecutorV9.exe 38 PID 2148 wrote to memory of 2064 2148 PanelExecutorV9.exe 40 PID 2148 wrote to memory of 2064 2148 PanelExecutorV9.exe 40 PID 2148 wrote to memory of 2064 2148 PanelExecutorV9.exe 40 PID 2060 wrote to memory of 1672 2060 taskeng.exe 43 PID 2060 wrote to memory of 1672 2060 taskeng.exe 43 PID 2060 wrote to memory of 1672 2060 taskeng.exe 43 PID 2060 wrote to memory of 680 2060 taskeng.exe 44 PID 2060 wrote to memory of 680 2060 taskeng.exe 44 PID 2060 wrote to memory of 680 2060 taskeng.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PanelExecutorV9.exe"C:\Users\Admin\AppData\Local\Temp\PanelExecutorV9.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\PanelExecutorV9.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'PanelExecutorV9.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\PanelExecutorV9'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'PanelExecutorV9'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "PanelExecutorV9" /tr "C:\ProgramData\PanelExecutorV9"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2064
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {32CA13BE-B276-4781-A2A8-36385CD4488C} S-1-5-21-3502430532-24693940-2469786940-1000:PSBQWFYT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\ProgramData\PanelExecutorV9C:\ProgramData\PanelExecutorV92⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\ProgramData\PanelExecutorV9C:\ProgramData\PanelExecutorV92⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:680
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD55b349257f829bcea74f13e36526eaee7
SHA1818fb201c0c7064ecf0d297d9aa636187219045a
SHA25669bb4ee4cbbc3db5659dc6fb84da71be308f5ffe1d1a1474b68ef0c9cdfb93ef
SHA5129bed76416df1293017a7481f5864f4ffa3f06348d41a0c88c505ded6287e95cec4be3856fdf3664d3b91c9a39a5e7b2408b9112bae134832f7570bc80566a09e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56205b954639f879f133bed9e49aef1d6
SHA10c07ccf08aa380e38c9565801b78e6064c5842e8
SHA2561284cebe0921db5027cfa0cdec8371a968058e9e54a67ba79357a14b2958e422
SHA512e0345b4f02e931afbc0b58478dcf7ce2073ac2dca97442c1b7ca0dedd4637c8bc32fbd35cad83a3a89c2e540ee5e4bb68a13ca96d5a746ddc3282d21b7b9def1