Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 10:16
Behavioral task
behavioral1
Sample
KRX обновленная версия/Krx Обновленная версия.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KRX обновленная версия/Krx Обновленная версия.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
KRX обновленная версия/fastutil-8.5.9.jar
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
KRX обновленная версия/fastutil-8.5.9.jar
Resource
win10v2004-20240802-en
General
-
Target
KRX обновленная версия/Krx Обновленная версия.exe
-
Size
65KB
-
MD5
e7a6ec69e6bed73ec2c858f202679444
-
SHA1
c65b59c8251101b5737bee8ec83737ee43c2c481
-
SHA256
20fbb2958861b7b995343c13b41f6eb058e812463afc080e61af4d317b132223
-
SHA512
426d29fb4b936be161f5da8ed9f625afc7cf9c7c29da3c13c6b681d4fde7c1b8983f16c43d13e4b91547258cf682bf65aeddec2f64bb7b777d8c15b3c408a19b
-
SSDEEP
1536:RfrO2VZW+wFw/G0OpsouwMjW+bY1OIaBl62kvOKCpVd/wQqnF:5rOpwWMK+bYekvOKCbd/vAF
Malware Config
Extracted
xworm
127.0.0.1:56384
22.ip.gl.ply.gg:56384
-
Install_directory
%AppData%
-
install_file
System.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1716-1-0x0000000000B40000-0x0000000000B56000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1344 powershell.exe 2508 powershell.exe 2636 powershell.exe 2668 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk Krx Обновленная версия.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk Krx Обновленная версия.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\System.exe" Krx Обновленная версия.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1344 powershell.exe 2508 powershell.exe 2636 powershell.exe 2668 powershell.exe 1716 Krx Обновленная версия.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1716 Krx Обновленная версия.exe Token: SeDebugPrivilege 1344 powershell.exe Token: SeDebugPrivilege 2508 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 1716 Krx Обновленная версия.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1716 Krx Обновленная версия.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1344 1716 Krx Обновленная версия.exe 28 PID 1716 wrote to memory of 1344 1716 Krx Обновленная версия.exe 28 PID 1716 wrote to memory of 1344 1716 Krx Обновленная версия.exe 28 PID 1716 wrote to memory of 2508 1716 Krx Обновленная версия.exe 30 PID 1716 wrote to memory of 2508 1716 Krx Обновленная версия.exe 30 PID 1716 wrote to memory of 2508 1716 Krx Обновленная версия.exe 30 PID 1716 wrote to memory of 2636 1716 Krx Обновленная версия.exe 32 PID 1716 wrote to memory of 2636 1716 Krx Обновленная версия.exe 32 PID 1716 wrote to memory of 2636 1716 Krx Обновленная версия.exe 32 PID 1716 wrote to memory of 2668 1716 Krx Обновленная версия.exe 34 PID 1716 wrote to memory of 2668 1716 Krx Обновленная версия.exe 34 PID 1716 wrote to memory of 2668 1716 Krx Обновленная версия.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\KRX обновленная версия\Krx Обновленная версия.exe"C:\Users\Admin\AppData\Local\Temp\KRX обновленная версия\Krx Обновленная версия.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\KRX обновленная версия\Krx Обновленная версия.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Krx Обновленная версия.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DXRCOKMZZCETLC7LIEAV.temp
Filesize7KB
MD5568145b49c34fb305b074ed8d4c8c6d3
SHA16e84ad44d673350bf7d45a1419291bdcd3b9963a
SHA256d6729a4cadb34f2ba2d62c5352f65ceae4e2d5079bcff21b883524fc3551e6fe
SHA5125d40f20c12169aade178c9f48ea2ca47602012d30edf7a13afecc27bd7c18143ebb677fe8a6236547f548a8be39766be7f8150cc700b81b3f75646f4c96e64ad