Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
361s -
max time network
604s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 18:14
Behavioral task
behavioral1
Sample
XWorm V5.2/XWorm V5.2.exe
Resource
win7-20240903-en
General
-
Target
XWorm V5.2/XWorm V5.2.exe
-
Size
73KB
-
MD5
b85f72648cf99409357519725c9bd5fc
-
SHA1
de3b9162632a96c4a3ac27da6663399a0d393910
-
SHA256
b06d089bd5be63788ef530ff1f93216625aa66d1d811f9ec3f2892268b656011
-
SHA512
4569a7a710ea4226dc81b6d158cabae1dd0e5452d5847e5d29d68efa0e2572092c19c9887c5a8498acb78dd2c961bb1d72750e671ff89de0ce2c0b6922292804
-
SSDEEP
1536:jqst7fwnejh7pHWpUhFYdsTudTb42WKvCBXH3KyuJG6JyORxaE1QHK:jBFZ7pWpHmWTb42NCXRu7yORoEyHK
Malware Config
Extracted
xworm
uk1.localto.net:3725
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2488-1-0x0000000001300000-0x0000000001318000-memory.dmp family_xworm behavioral1/files/0x0009000000018710-34.dat family_xworm behavioral1/memory/1896-36-0x0000000001220000-0x0000000001238000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 892 powershell.exe 1116 powershell.exe 1608 powershell.exe 2676 powershell.exe 2576 powershell.exe 2580 powershell.exe 2144 powershell.exe 956 powershell.exe -
Deletes itself 1 IoCs
pid Process 3032 cmd.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XWorm V5.2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XWorm V5.2.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1896 svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2132 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2456 schtasks.exe 1524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1608 powershell.exe 2676 powershell.exe 2576 powershell.exe 2580 powershell.exe 2488 XWorm V5.2.exe 2144 powershell.exe 956 powershell.exe 892 powershell.exe 1116 powershell.exe 1896 svchost.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2488 XWorm V5.2.exe Token: SeDebugPrivilege 1608 powershell.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 2576 powershell.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 2488 XWorm V5.2.exe Token: SeDebugPrivilege 1896 svchost.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeDebugPrivilege 1116 powershell.exe Token: SeDebugPrivilege 1896 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2488 XWorm V5.2.exe 1896 svchost.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1608 2488 XWorm V5.2.exe 32 PID 2488 wrote to memory of 1608 2488 XWorm V5.2.exe 32 PID 2488 wrote to memory of 1608 2488 XWorm V5.2.exe 32 PID 2488 wrote to memory of 2676 2488 XWorm V5.2.exe 34 PID 2488 wrote to memory of 2676 2488 XWorm V5.2.exe 34 PID 2488 wrote to memory of 2676 2488 XWorm V5.2.exe 34 PID 2488 wrote to memory of 2576 2488 XWorm V5.2.exe 36 PID 2488 wrote to memory of 2576 2488 XWorm V5.2.exe 36 PID 2488 wrote to memory of 2576 2488 XWorm V5.2.exe 36 PID 2488 wrote to memory of 2580 2488 XWorm V5.2.exe 38 PID 2488 wrote to memory of 2580 2488 XWorm V5.2.exe 38 PID 2488 wrote to memory of 2580 2488 XWorm V5.2.exe 38 PID 2488 wrote to memory of 2456 2488 XWorm V5.2.exe 40 PID 2488 wrote to memory of 2456 2488 XWorm V5.2.exe 40 PID 2488 wrote to memory of 2456 2488 XWorm V5.2.exe 40 PID 1904 wrote to memory of 1896 1904 taskeng.exe 43 PID 1904 wrote to memory of 1896 1904 taskeng.exe 43 PID 1904 wrote to memory of 1896 1904 taskeng.exe 43 PID 2488 wrote to memory of 2872 2488 XWorm V5.2.exe 44 PID 2488 wrote to memory of 2872 2488 XWorm V5.2.exe 44 PID 2488 wrote to memory of 2872 2488 XWorm V5.2.exe 44 PID 2488 wrote to memory of 3032 2488 XWorm V5.2.exe 46 PID 2488 wrote to memory of 3032 2488 XWorm V5.2.exe 46 PID 2488 wrote to memory of 3032 2488 XWorm V5.2.exe 46 PID 3032 wrote to memory of 2132 3032 cmd.exe 48 PID 3032 wrote to memory of 2132 3032 cmd.exe 48 PID 3032 wrote to memory of 2132 3032 cmd.exe 48 PID 1896 wrote to memory of 2144 1896 svchost.exe 49 PID 1896 wrote to memory of 2144 1896 svchost.exe 49 PID 1896 wrote to memory of 2144 1896 svchost.exe 49 PID 1896 wrote to memory of 956 1896 svchost.exe 51 PID 1896 wrote to memory of 956 1896 svchost.exe 51 PID 1896 wrote to memory of 956 1896 svchost.exe 51 PID 1896 wrote to memory of 892 1896 svchost.exe 53 PID 1896 wrote to memory of 892 1896 svchost.exe 53 PID 1896 wrote to memory of 892 1896 svchost.exe 53 PID 1896 wrote to memory of 1116 1896 svchost.exe 55 PID 1896 wrote to memory of 1116 1896 svchost.exe 55 PID 1896 wrote to memory of 1116 1896 svchost.exe 55 PID 1896 wrote to memory of 1524 1896 svchost.exe 57 PID 1896 wrote to memory of 1524 1896 svchost.exe 57 PID 1896 wrote to memory of 1524 1896 svchost.exe 57 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2\XWorm V5.2.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XWorm V5.2\XWorm V5.2.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XWorm V5.2.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2456
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "svchost"2⤵PID:2872
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp5DAA.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2132
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FDA6AA97-9796-4AD7-A9FE-5140E028453E} S-1-5-21-457978338-2990298471-2379561640-1000:WOUOSVRD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\ProgramData\svchost.exeC:\ProgramData\svchost.exe2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1524
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5b85f72648cf99409357519725c9bd5fc
SHA1de3b9162632a96c4a3ac27da6663399a0d393910
SHA256b06d089bd5be63788ef530ff1f93216625aa66d1d811f9ec3f2892268b656011
SHA5124569a7a710ea4226dc81b6d158cabae1dd0e5452d5847e5d29d68efa0e2572092c19c9887c5a8498acb78dd2c961bb1d72750e671ff89de0ce2c0b6922292804
-
Filesize
173B
MD5abca370ebf94f4a505a0bb376fb254d0
SHA1b11c714712e025950ddc8d1d271f4f9bd5b0fced
SHA256f55b6b94711340bb4603459cd34c86fd04318c2c8a89ceb970595ed1c759e19e
SHA512841918abb731fb39c897a8d37adbac5c126675ba832bbc781a4ae135cf1bfc73a90517f7beea48efc6dabb685a041a6f634f1513f39a5fd2ae2106771e2a498c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5bfd94c9bc61f5f1267e0f44dea3820e6
SHA13b96900967e5a7215884c9eb66cd0456d08e5658
SHA256e2fe1155812ef4af7d4e03e08a2e4b526b02c26d8d1f81bd9a5ba97490a538e1
SHA512c55d65b09c703161f81252da83a1268e7cea7c7e739cfa07fc42ae0986385efc020ed3d5031ef8a3e15d576b5bca6d23b98617e416e0917f02ade27d6c44ac0e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52ead4730be21afe95d82cb3c2caba064
SHA1dd97c799d72c7bf78df0feae376659c27b23597a
SHA256c2e31cefae4dd182c545cee65361cb85e8cb8013100a90fb640471368448e241
SHA512293f09e253bec0cc3d4e301f7bdca2fa0eaf826ebb835c73480cc7a4e2caddd55423b1c4df7e0c91030c13462256604bf128a3ffc964197925cab35de64a8020