Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 17:33

General

  • Target

    6a93c6b6467f2e24918f9c39f2b0d91a14974b3af096d39dda126c02f3299bc8.exe

  • Size

    4.1MB

  • MD5

    7531fbb7431039bda2b19160e0b9c2d4

  • SHA1

    b7f4a971ebf8128ee1ea7cb764b9582fb73b8002

  • SHA256

    6a93c6b6467f2e24918f9c39f2b0d91a14974b3af096d39dda126c02f3299bc8

  • SHA512

    5b8b09d896e12f3da879939f3c925da58ba79c6c1f2559594b1eb11d8fd5f63d3afeb12484b8656e0ba929cb0bb7fbb67a566d3599769c955885ca21b4036487

  • SSDEEP

    98304:51mCYY8UGo4x83fa1lyrd3qNz6VTDwgiLC/sE1:nmCWUUqi1s530+VohE

Malware Config

Extracted

Family

xworm

C2

lijaligibidu-35558.portmap.host:35558

127.0.0.1:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows Security.exe

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • AgentTesla payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Drops file in System32 directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a93c6b6467f2e24918f9c39f2b0d91a14974b3af096d39dda126c02f3299bc8.exe
    "C:\Users\Admin\AppData\Local\Temp\6a93c6b6467f2e24918f9c39f2b0d91a14974b3af096d39dda126c02f3299bc8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Roaming\TalibanStealerInstaller.exe
      "C:\Users\Admin\AppData\Roaming\TalibanStealerInstaller.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdAByACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHoAYwBqACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAdwBuACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGsAdgBjACMAPgA="
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:796
      • C:\Users\Admin\AppData\Local\Temp\Windows Security.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Security.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHcAbQBrACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAYwB5ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGoAZgBmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAdwBiACMAPgA="
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2804
        • C:\Users\Admin\AppData\Local\Temp\c9IDU7463.exe
          "C:\Users\Admin\AppData\Local\Temp\c9IDU7463.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2016
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Client Server Runtime Process.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1000
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Client Server Runtime Process.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1688
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE6D6.tmp.bat""
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2332
            • C:\Windows\system32\timeout.exe
              timeout 3
              6⤵
              • Delays execution with timeout.exe
              PID:568
      • C:\Users\Admin\AppData\Local\Temp\TalibanStealerInstaller.exe
        "C:\Users\Admin\AppData\Local\Temp\TalibanStealerInstaller.exe"
        3⤵
        • Executes dropped EXE
        • Enumerates system info in registry
        PID:2832
    • C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe
      "C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2064
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1612
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7ABE9C8A-51AE-4255-9893-DFB8C7ABCD8D} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\System32\Client Server Runtime Process.exe
      "C:\Windows\System32\Client Server Runtime Process.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGkAeABoACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAdQBmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGoAYgBqACMAPgA="
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2148
      • C:\Users\Admin\AppData\Local\Temp\Windows Security.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Security.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2068
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHYAZQBuACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAdQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGUAegB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAdQBuACMAPgA="
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2684
        • C:\Users\Admin\AppData\Local\Temp\Windows Security Notification.exe
          "C:\Users\Admin\AppData\Local\Temp\Windows Security Notification.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2088
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Windows Security Notification.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2824
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Security Notification.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1444
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\malware builder'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2688
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'malware builder'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1448
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "malware builder" /tr "C:\Users\Admin\AppData\Roaming\malware builder"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TalibanStealerInstaller.exe

    Filesize

    2.5MB

    MD5

    cdfcc41584dcd2a57da70353cb9955a8

    SHA1

    78b0a8cda3187d7ba842c9148446da5c628370b5

    SHA256

    be453771400d21a320f759b3b99bd7cf07d9d8301db6bce115bafae1aff79fb3

    SHA512

    4db311aac921a20b9be5c28e66b54912065ac5aeb56b45c20fe7383ff69aa50622e6da383f029a6291525457439cd2e6ac403860af4d82bd61a86df3aad9e7dc

  • C:\Users\Admin\AppData\Local\Temp\Windows Security Notification.exe

    Filesize

    114KB

    MD5

    d59bcf447ab9a90d1c6e9701d85d5700

    SHA1

    c7eff0f1d56e71a601cff1e161879ea520886a32

    SHA256

    50738407f70e37470182a0da6b44e78eb9cd2be3f7c43e066ea85f92388c79ae

    SHA512

    4a33de1700a6740c354d79b6e2f706dbc924805b6c8aae03d68cf17427e52a58e65a177622266f4d4e9d0d0904d8ab7a55af2576d555bcc5868b9084730e7180

  • C:\Users\Admin\AppData\Local\Temp\Windows Security.exe

    Filesize

    164KB

    MD5

    9efb0ca4f150666bedbc6ef91e0e6f4b

    SHA1

    13b140227e709d3a534d4158111c9256b14474b3

    SHA256

    5ff4fc5985d8d9877dd5b4abe081ee91681b187e99a466b802a8795fd9e500ab

    SHA512

    7e16155776a1431eda8da3b2fe134b52863c0917170dc64ded710c5133705a0c019c930f696d5972a0a63270f59900cfca4b776631c0b5442c62696db4f7ca36

  • C:\Users\Admin\AppData\Local\Temp\tmpE6D6.tmp.bat

    Filesize

    161B

    MD5

    418aa1ed07f86eb7b11bc1a83b92ede1

    SHA1

    b9f4faaae072f1c2fea654bf047aad1ee75d45bb

    SHA256

    9d7ed40f9d84ec144ab56f74ee2c8b0a91c2c99fe30ac99af9cb8fea53258542

    SHA512

    4232a2ffb9587b0d3c7e14c116be2ece4bd2df4e1794975f8075f4d1e49773a20750b7fbee1e078111e0b158f3120da1684d17826390a0fa12ecf87bd4c63545

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    9172ac7f1701803fd755992e5685e726

    SHA1

    28b7f19c0fe40578f2654efce727eef73969fbe9

    SHA256

    f0244b6537aa30c2c91d7a28fed0f48d39625f8bd233cf9f8cb72c9fb8f3a967

    SHA512

    27f4fb0e4783b3e0a6d60097c0fe98dbdd3c16bb09edec7445468ac9665c32e74515afa4753f36ffcc9b0946f840e7bbd6155271dfc27ed183760dc35757a433

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    d3e29054a4ab83da17e8aa09906f5b85

    SHA1

    b57a450797573e71c7fdcd3cd939dd2a3198769d

    SHA256

    2345a6b187405f7217fc3d951f07339a33a0ffab66571d2b701edd5246ba897d

    SHA512

    89d48b06a0c8db8e7f918af7f486d3dc2d769cbe3309d7b31be92fd5269abde530ca25d61ff328e8eb53fd6f41b43652a60b9ce8a9f7b901b2fc6ff52bde60aa

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    3bd999d14ee43673d1926b2a46ce6e63

    SHA1

    207a10020f3ebda3d6ecc86483b84f1a844457ec

    SHA256

    05a2a88483f4e2b439b9af66101b69637619683d3a8ea2bda806c8d1138281cc

    SHA512

    c483e33b3002902eab0a9fd3ccbbb1f7c1d9e252bf7ead558b310f6eb559fb29a6a64cdb9b56998bd3e2db7ac0cb42f0cbdefe71a4aee7a64661121a213d74a4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    692ff0412050c52ab0c4992556590cb5

    SHA1

    3d8fe01a6c0d5e6416c73b68ee482c3b283cc5fc

    SHA256

    76b951b4ff8b3fd3ec418eb52246d8cd1597ca0d480ff1447e96e8cfe89a6816

    SHA512

    5daf672431e9c1ab348d69b5dbc4b47edc887dcc78140ac6d54118d0f850727362cc18ffb795b29e63e7911d5f0fc693be76e945dfb43276a8e6f374bf91a440

  • C:\Users\Admin\AppData\Roaming\TalibanStealerInstaller.exe

    Filesize

    3.7MB

    MD5

    0bd9c3971db333e1ccc5c327c4b06baa

    SHA1

    2e319ceb3f8fd1cd61d5e40002e493117ed9321d

    SHA256

    651b7894bf375daa0ec4d1fe71ba43f5fd3fcf62363d4141a767f7c8abedb216

    SHA512

    997b7356d55218f72e289b95b6170fb7c8998a2caedc19614d118f6566453301403339a3db6a0a9b8b9d73feb17947661571040a458e938c7db649b637bb39bb

  • C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe

    Filesize

    75KB

    MD5

    cf219a189dae4a022f26dd58cd5367e6

    SHA1

    76c2e7b756e894afc4e5fd7267fce398d58c518f

    SHA256

    725c0bcdb953e39e96a0192d2712b261541647259e494c583d19697a10d2ffbe

    SHA512

    21dc7cdd5ea07be708a5c696708207a1760851d2fbb608969254a8f3e806bbb87b6b27a4d5f4cecf1b5d90f6fc81759fd9f6222ddafdb955d41b0333ea085f1f

  • \Users\Admin\AppData\Local\Temp\Windows Security.exe

    Filesize

    1018KB

    MD5

    d8cdeec022d5fda0ab78a7ecc9efa3ae

    SHA1

    3cb31d1646d3f63019a0c3745d3f2c62bdaab243

    SHA256

    e5b7e580db8476b8e4d2ae806288984df4eb0c5a061bed61c77157a2628ae1ea

    SHA512

    4ddd191a8c352cef83ba3dee0a2ba15fcd95c397fc13af152c2ef9731ec66c7ee332c8079567ee03e77a38225a8453aee798f573d25c35cb98921d09597ed63e

  • \Users\Admin\AppData\Local\Temp\c9IDU7463.exe

    Filesize

    971KB

    MD5

    26efc684ddd0782b295a6ee4a76e3256

    SHA1

    08cc73ef5c1b02e09765181a5acee1a7018dcffc

    SHA256

    bf832f28b8d9f2ff077f691bd7e8a2cf46f3a4ac0ee8ee2d2f2944089abd20ab

    SHA512

    20ba9e73514148613943db974cf88874907f9fe19e1cf5d81d9bf83ffbd233be80e925c62a5430a7ef69099e603ae54d60680020e0de58e632897f8c4aecfb49

  • memory/1000-50-0x000000001B730000-0x000000001BA12000-memory.dmp

    Filesize

    2.9MB

  • memory/1000-51-0x0000000002290000-0x0000000002298000-memory.dmp

    Filesize

    32KB

  • memory/1412-73-0x00000000005F0000-0x00000000006B8000-memory.dmp

    Filesize

    800KB

  • memory/1412-74-0x0000000000AF0000-0x0000000000B2C000-memory.dmp

    Filesize

    240KB

  • memory/1412-72-0x0000000000D70000-0x0000000000E6A000-memory.dmp

    Filesize

    1000KB

  • memory/1620-1-0x0000000001290000-0x00000000016A4000-memory.dmp

    Filesize

    4.1MB

  • memory/1620-0-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

    Filesize

    4KB

  • memory/1688-57-0x000000001B690000-0x000000001B972000-memory.dmp

    Filesize

    2.9MB

  • memory/1688-58-0x00000000027E0000-0x00000000027E8000-memory.dmp

    Filesize

    32KB

  • memory/2016-42-0x0000000000980000-0x0000000000A7A000-memory.dmp

    Filesize

    1000KB

  • memory/2064-12-0x00000000008D0000-0x00000000008E8000-memory.dmp

    Filesize

    96KB

  • memory/2068-86-0x00000000013B0000-0x00000000013DE000-memory.dmp

    Filesize

    184KB

  • memory/2088-92-0x0000000000F60000-0x0000000000F82000-memory.dmp

    Filesize

    136KB

  • memory/2832-43-0x000000001B540000-0x000000001B68E000-memory.dmp

    Filesize

    1.3MB

  • memory/2832-45-0x000000001B910000-0x000000001BB26000-memory.dmp

    Filesize

    2.1MB

  • memory/2832-29-0x00000000002D0000-0x000000000054E000-memory.dmp

    Filesize

    2.5MB

  • memory/2832-44-0x00000000002B0000-0x00000000002C4000-memory.dmp

    Filesize

    80KB