Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 01:12
Behavioral task
behavioral1
Sample
222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe
Resource
win7-20240729-en
General
-
Target
222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe
-
Size
205KB
-
MD5
f66d550297b5c67560fcdfef40b9bf5e
-
SHA1
9ea877d3063ed6f9f381b74e0fc71b9e72b52929
-
SHA256
222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6
-
SHA512
8247e3a890163c6fddec7dc8bfb420c51cfa6aa5863203f733ad34b611f598c92d6e9405af64ade3fe8149dca55c1504071677b7dbd3c5b57f19a61f43f0ab0d
-
SSDEEP
3072:ff05a/CTR9hFc9UxOMh8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLnF:WR9Hc9wUhcX7elbKTuq9bfF/H9d9n
Malware Config
Extracted
xworm
5.0
147.50.240.203:7000
X0ZQBFW2mJiaVxWi
-
Install_directory
%ProgramData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1656-1-0x0000000000CD0000-0x0000000000D08000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2200 powershell.exe 4152 powershell.exe 4940 powershell.exe 2668 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2200 powershell.exe 2200 powershell.exe 4152 powershell.exe 4152 powershell.exe 4940 powershell.exe 4940 powershell.exe 2668 powershell.exe 2668 powershell.exe 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 4152 powershell.exe Token: SeDebugPrivilege 4940 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2200 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe 93 PID 1656 wrote to memory of 2200 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe 93 PID 1656 wrote to memory of 4152 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe 96 PID 1656 wrote to memory of 4152 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe 96 PID 1656 wrote to memory of 4940 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe 98 PID 1656 wrote to memory of 4940 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe 98 PID 1656 wrote to memory of 2668 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe 100 PID 1656 wrote to memory of 2668 1656 222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe"C:\Users\Admin\AppData\Local\Temp\222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD5b129154ef334e2655fc7290528be3877
SHA1ca5992210ad0537d47a12cf4624e1e0e05feba88
SHA256671d36cb188e89e11c4f79e55ad666eaa760f9a0a701721d6c463cf6fd55619b
SHA5120cc4affa208a99112e76b5b8701408bfe204589d0f498df0e1f1827781881d2024eb421cf0013e99a69a2897a14cc5d32af5409a37b753cd3846948d518d8b4a
-
Filesize
944B
MD5340b40d863485995ea7eaab9c386dc21
SHA147c7de08001050abece764110b8cc028e3c9cb8f
SHA2565087735f420e1649e208017b143c45d25893b36fe32fd4fa7c97cebf5fe87f19
SHA5121d007bfeca3aee0312cc64db448746db3153b4a7d77997d3d63b0bc7efe646dc6ebc1ba5fc1a0f62f48c18cdb07d8c0343d1433c13f7ecd62dc281d018d45eed
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82