Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/08/2024, 17:51
Behavioral task
behavioral1
Sample
feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe
Resource
win7-20240729-en
General
-
Target
feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe
-
Size
40KB
-
MD5
3ab61ee8a81099edddf87af587420a10
-
SHA1
d6c0f6f60d13cc786cf7ac0df2c45b5dc47b945c
-
SHA256
feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f
-
SHA512
f43326c79ea8bd118fd90efc8c2c8306e02901727ffd7c6666b2a35820eb8799976007f4886a68a7f411509ad61dcf7ddf5a3630fa5342014ad5aa978818ff3f
-
SSDEEP
768:pNfPMSk3K/EzTb/008WuFZ4ZJF5PC9O9Fy68OMhi3/aV:nf05a/CTjp89IFc9Uc68OMsi
Malware Config
Extracted
xworm
5.0
154.197.69.165:7000
jcTVbnlMjCEJAYCp
-
Install_directory
%AppData%
-
install_file
crss.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1752-1-0x0000000000380000-0x0000000000390000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2616 powershell.exe 332 powershell.exe 2892 powershell.exe 2344 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\crss.lnk feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\crss.lnk feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2892 powershell.exe 2344 powershell.exe 2616 powershell.exe 332 powershell.exe 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 332 powershell.exe Token: SeDebugPrivilege 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2892 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 31 PID 1752 wrote to memory of 2892 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 31 PID 1752 wrote to memory of 2892 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 31 PID 1752 wrote to memory of 2344 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 33 PID 1752 wrote to memory of 2344 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 33 PID 1752 wrote to memory of 2344 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 33 PID 1752 wrote to memory of 2616 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 35 PID 1752 wrote to memory of 2616 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 35 PID 1752 wrote to memory of 2616 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 35 PID 1752 wrote to memory of 332 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 37 PID 1752 wrote to memory of 332 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 37 PID 1752 wrote to memory of 332 1752 feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe"C:\Users\Admin\AppData\Local\Temp\feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'feba3474a30f9b010741c34ee4773777fc329390418713ffef424b2eb9243a5f.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\crss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'crss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52c52edc915e51e67a85a30ff2aa8db3a
SHA154bf217de9a6677636db50ca49e543b12852c92d
SHA256297698a519ff66f509c5ebd3e1653f4f03b87f9c3665e77712545662140d3dca
SHA512f0f7eba46c7e92d272a1c11b5c18b6715fc4fe24f9abe90fd17fd95004b39b33d83efdad2867c74c3e71ff377ed24ecdd06a2675127dcc37ecdec6324f3f6861