Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
XWorm.V5.3.Optimized.Bin.7z
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XWorm.V5.3.Optimized.Bin.7z
Resource
win10v2004-20240802-en
General
-
Target
XWorm.V5.3.Optimized.Bin.7z
-
Size
29.5MB
-
MD5
187b25b9e02c2b5d01a70d9d1855dd7c
-
SHA1
d0c7d39012ad0507239a3b060ea42cc13b22eb65
-
SHA256
f26803b764a54a90852b7fd274d5ced7a8a58f1715d3ab4b96900ad4f9dd0410
-
SHA512
bea5cec59d0ebee26a71c78dc38da47a25ea7932d119868caf82b5e4bbbcecd8969abea80ad41b65352f264ced33c457a041c0d9f321c272a8f913802ee254ed
-
SSDEEP
786432:ILW4dBG6KKNtxT6xewFcJbnYrFWNbqjnZ5M5od:3wT6xhqRsubq15bd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2480 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2480 AcroRd32.exe 2480 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2860 1592 cmd.exe 31 PID 1592 wrote to memory of 2860 1592 cmd.exe 31 PID 1592 wrote to memory of 2860 1592 cmd.exe 31 PID 2860 wrote to memory of 2868 2860 rundll32.exe 32 PID 2860 wrote to memory of 2868 2860 rundll32.exe 32 PID 2860 wrote to memory of 2868 2860 rundll32.exe 32 PID 2868 wrote to memory of 2480 2868 rundll32.exe 34 PID 2868 wrote to memory of 2480 2868 rundll32.exe 34 PID 2868 wrote to memory of 2480 2868 rundll32.exe 34 PID 2868 wrote to memory of 2480 2868 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\XWorm.V5.3.Optimized.Bin.7z1⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\XWorm.V5.3.Optimized.Bin.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\XWorm.V5.3.Optimized.Bin.7z3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm.V5.3.Optimized.Bin.7z"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2480
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5758c97869d48f7406f18ac149167a24b
SHA17a4fb3ce8fd350c684916070f86d7fa322830813
SHA256b5cc199c77f9eda75def3dfde3c4b0e097c8919a44eba811176ba48654369df7
SHA5125b0faba5ee489acfc3602570787ca65ae0cc418de2e0c1d12899b2980e5a1b06d1f86ab0c5cecd76eeb8778bf4532893a37a4de1db97ce9f498f0c2e212ee29d