Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 15:31
Behavioral task
behavioral1
Sample
WindowsHealthProtect.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WindowsHealthProtect.exe
Resource
win10v2004-20240709-en
General
-
Target
WindowsHealthProtect.exe
-
Size
157KB
-
MD5
867bd1a3adb00960ae067e0a78eb8169
-
SHA1
7ab2c2bbdd6dc7c8ae9fbbaad09a323e28865371
-
SHA256
324a08c32241c38030bd495b74411382b6694dcf74cf66caff1d15b6b2370c08
-
SHA512
5937cd0f869da3f00095319ca53f15bc924f512895676b33f9085a0ef21b5f7e5d33acafc7e47b4039f543980f73dc5a92bee19556b14588e524b9137e4c3c19
-
SSDEEP
3072:MCaHVqFw9CwOCVJ4NpVq8BxFRzaqF+o2GQJ7/JzqVfGvV:Hw9/gVqwlL
Malware Config
Extracted
xworm
5.0
127.0.0.1:6004
is-eminem.gl.at.ply.gg:6004
88.168.211.65:6004
bUdXY3BrQxasTJsJ
-
Install_directory
%ProgramData%
-
install_file
WindowsHealthProtect.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/904-1-0x00000000001A0000-0x00000000001CE000-memory.dmp family_xworm behavioral1/files/0x000f00000001227f-34.dat family_xworm behavioral1/memory/1540-36-0x00000000008E0000-0x000000000090E000-memory.dmp family_xworm behavioral1/memory/2376-40-0x0000000000020000-0x000000000004E000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2348 powershell.exe 2756 powershell.exe 2872 powershell.exe 2780 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsHealthProtect.lnk WindowsHealthProtect.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsHealthProtect.lnk WindowsHealthProtect.exe -
Executes dropped EXE 2 IoCs
pid Process 1540 WindowsHealthProtect.exe 2376 WindowsHealthProtect.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsHealthProtect = "C:\\ProgramData\\WindowsHealthProtect.exe" WindowsHealthProtect.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2112 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2348 powershell.exe 2756 powershell.exe 2872 powershell.exe 2780 powershell.exe 904 WindowsHealthProtect.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 904 WindowsHealthProtect.exe Token: SeDebugPrivilege 2348 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 904 WindowsHealthProtect.exe Token: SeDebugPrivilege 1540 WindowsHealthProtect.exe Token: SeDebugPrivilege 2376 WindowsHealthProtect.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 904 WindowsHealthProtect.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 904 wrote to memory of 2348 904 WindowsHealthProtect.exe 30 PID 904 wrote to memory of 2348 904 WindowsHealthProtect.exe 30 PID 904 wrote to memory of 2348 904 WindowsHealthProtect.exe 30 PID 904 wrote to memory of 2756 904 WindowsHealthProtect.exe 32 PID 904 wrote to memory of 2756 904 WindowsHealthProtect.exe 32 PID 904 wrote to memory of 2756 904 WindowsHealthProtect.exe 32 PID 904 wrote to memory of 2872 904 WindowsHealthProtect.exe 34 PID 904 wrote to memory of 2872 904 WindowsHealthProtect.exe 34 PID 904 wrote to memory of 2872 904 WindowsHealthProtect.exe 34 PID 904 wrote to memory of 2780 904 WindowsHealthProtect.exe 36 PID 904 wrote to memory of 2780 904 WindowsHealthProtect.exe 36 PID 904 wrote to memory of 2780 904 WindowsHealthProtect.exe 36 PID 904 wrote to memory of 2112 904 WindowsHealthProtect.exe 38 PID 904 wrote to memory of 2112 904 WindowsHealthProtect.exe 38 PID 904 wrote to memory of 2112 904 WindowsHealthProtect.exe 38 PID 2396 wrote to memory of 1540 2396 taskeng.exe 43 PID 2396 wrote to memory of 1540 2396 taskeng.exe 43 PID 2396 wrote to memory of 1540 2396 taskeng.exe 43 PID 904 wrote to memory of 2892 904 WindowsHealthProtect.exe 44 PID 904 wrote to memory of 2892 904 WindowsHealthProtect.exe 44 PID 904 wrote to memory of 2892 904 WindowsHealthProtect.exe 44 PID 2396 wrote to memory of 2376 2396 taskeng.exe 46 PID 2396 wrote to memory of 2376 2396 taskeng.exe 46 PID 2396 wrote to memory of 2376 2396 taskeng.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WindowsHealthProtect.exe"C:\Users\Admin\AppData\Local\Temp\WindowsHealthProtect.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\WindowsHealthProtect.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsHealthProtect.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\WindowsHealthProtect.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsHealthProtect.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WindowsHealthProtect" /tr "C:\ProgramData\WindowsHealthProtect.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2112
-
-
C:\Windows\system32\CMD.EXE"CMD.EXE"2⤵PID:2892
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {672DB3B9-F90F-4E5C-8CE2-BE671854D492} S-1-5-21-940600906-3464502421-4240639183-1000:MGWWAYYN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\ProgramData\WindowsHealthProtect.exeC:\ProgramData\WindowsHealthProtect.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\ProgramData\WindowsHealthProtect.exeC:\ProgramData\WindowsHealthProtect.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD5867bd1a3adb00960ae067e0a78eb8169
SHA17ab2c2bbdd6dc7c8ae9fbbaad09a323e28865371
SHA256324a08c32241c38030bd495b74411382b6694dcf74cf66caff1d15b6b2370c08
SHA5125937cd0f869da3f00095319ca53f15bc924f512895676b33f9085a0ef21b5f7e5d33acafc7e47b4039f543980f73dc5a92bee19556b14588e524b9137e4c3c19
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59700600368351a70f775d06ec52f25df
SHA14ff9c13b1dc7fd67e3f4d24ed389999397c08a70
SHA2564d5ed5801ea2cd54ca8bc181d124dc46e885c9b35148222a05859d53d2daf1c4
SHA5126c83f12046130e60ac769e2ff4595769d7802e86719491774646d6f564b7bbd44de327258b1c23137c7165d41df898b27be5284b5fbbef3a750f71fc8bc4dc87