Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
17s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07/11/2024, 21:01
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
XClient.exe
-
Size
43KB
-
MD5
b5cc96820c23ae9241f31f69ae0f4bd1
-
SHA1
2b34b1d40aaee3ad827f2f52c607078331bfa5d0
-
SHA256
282393aa38b758eb429d55acbfc2df1638741ee18eaa2fccf1ea638e396c1606
-
SHA512
3a08f0fa346c5a3823154d549c997aad2932c34c4d367729c89802a06029ae8dcdba9b053b93ebb279505f3aa96cdfa0d1addccd13065959be4fcec4553c15b0
-
SSDEEP
768:dOWZMZifma/E0s5qYhA4J1QD8PReLOY9bdJ5Zua6GhOOw2joI:dRv/ruAApiP9bf5V6GsOnjoI
Malware Config
Extracted
xworm
5.0
23.ip.gl.ply.gg:51353
<Xwormmm>:1
BsBmfJJT3ix8SkJS
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/4400-1-0x0000000000E10000-0x0000000000E22000-memory.dmp family_xworm behavioral1/files/0x002d00000004517c-73.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 656 powershell.exe 1224 powershell.exe 2700 powershell.exe 4972 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation XClient.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\svchost.exe" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 656 powershell.exe 656 powershell.exe 1224 powershell.exe 1224 powershell.exe 2700 powershell.exe 2700 powershell.exe 4972 powershell.exe 4972 powershell.exe 4432 taskmgr.exe 4432 taskmgr.exe 4400 XClient.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4400 XClient.exe Token: SeDebugPrivilege 656 powershell.exe Token: SeIncreaseQuotaPrivilege 656 powershell.exe Token: SeSecurityPrivilege 656 powershell.exe Token: SeTakeOwnershipPrivilege 656 powershell.exe Token: SeLoadDriverPrivilege 656 powershell.exe Token: SeSystemProfilePrivilege 656 powershell.exe Token: SeSystemtimePrivilege 656 powershell.exe Token: SeProfSingleProcessPrivilege 656 powershell.exe Token: SeIncBasePriorityPrivilege 656 powershell.exe Token: SeCreatePagefilePrivilege 656 powershell.exe Token: SeBackupPrivilege 656 powershell.exe Token: SeRestorePrivilege 656 powershell.exe Token: SeShutdownPrivilege 656 powershell.exe Token: SeDebugPrivilege 656 powershell.exe Token: SeSystemEnvironmentPrivilege 656 powershell.exe Token: SeRemoteShutdownPrivilege 656 powershell.exe Token: SeUndockPrivilege 656 powershell.exe Token: SeManageVolumePrivilege 656 powershell.exe Token: 33 656 powershell.exe Token: 34 656 powershell.exe Token: 35 656 powershell.exe Token: 36 656 powershell.exe Token: SeDebugPrivilege 1224 powershell.exe Token: SeIncreaseQuotaPrivilege 1224 powershell.exe Token: SeSecurityPrivilege 1224 powershell.exe Token: SeTakeOwnershipPrivilege 1224 powershell.exe Token: SeLoadDriverPrivilege 1224 powershell.exe Token: SeSystemProfilePrivilege 1224 powershell.exe Token: SeSystemtimePrivilege 1224 powershell.exe Token: SeProfSingleProcessPrivilege 1224 powershell.exe Token: SeIncBasePriorityPrivilege 1224 powershell.exe Token: SeCreatePagefilePrivilege 1224 powershell.exe Token: SeBackupPrivilege 1224 powershell.exe Token: SeRestorePrivilege 1224 powershell.exe Token: SeShutdownPrivilege 1224 powershell.exe Token: SeDebugPrivilege 1224 powershell.exe Token: SeSystemEnvironmentPrivilege 1224 powershell.exe Token: SeRemoteShutdownPrivilege 1224 powershell.exe Token: SeUndockPrivilege 1224 powershell.exe Token: SeManageVolumePrivilege 1224 powershell.exe Token: 33 1224 powershell.exe Token: 34 1224 powershell.exe Token: 35 1224 powershell.exe Token: 36 1224 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeIncreaseQuotaPrivilege 2700 powershell.exe Token: SeSecurityPrivilege 2700 powershell.exe Token: SeTakeOwnershipPrivilege 2700 powershell.exe Token: SeLoadDriverPrivilege 2700 powershell.exe Token: SeSystemProfilePrivilege 2700 powershell.exe Token: SeSystemtimePrivilege 2700 powershell.exe Token: SeProfSingleProcessPrivilege 2700 powershell.exe Token: SeIncBasePriorityPrivilege 2700 powershell.exe Token: SeCreatePagefilePrivilege 2700 powershell.exe Token: SeBackupPrivilege 2700 powershell.exe Token: SeRestorePrivilege 2700 powershell.exe Token: SeShutdownPrivilege 2700 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeSystemEnvironmentPrivilege 2700 powershell.exe Token: SeRemoteShutdownPrivilege 2700 powershell.exe Token: SeUndockPrivilege 2700 powershell.exe Token: SeManageVolumePrivilege 2700 powershell.exe Token: 33 2700 powershell.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe 4432 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4400 XClient.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4400 wrote to memory of 656 4400 XClient.exe 84 PID 4400 wrote to memory of 656 4400 XClient.exe 84 PID 4400 wrote to memory of 1224 4400 XClient.exe 89 PID 4400 wrote to memory of 1224 4400 XClient.exe 89 PID 4400 wrote to memory of 2700 4400 XClient.exe 93 PID 4400 wrote to memory of 2700 4400 XClient.exe 93 PID 4400 wrote to memory of 4972 4400 XClient.exe 95 PID 4400 wrote to memory of 4972 4400 XClient.exe 95 PID 4400 wrote to memory of 1848 4400 XClient.exe 98 PID 4400 wrote to memory of 1848 4400 XClient.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1848
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4432
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD56a807b1c91ac66f33f88a787d64904c1
SHA183c554c7de04a8115c9005709e5cd01fca82c5d3
SHA256155314c1c86d8d4e5b802f1eef603c5dd4a2f7c949f069a38af5ba4959bd8256
SHA51229f2d9f30fc081e7fe6e9fb772c810c9be0422afdc6aff5a286f49a990ededebcf0d083798c2d9f41ad8434393c6d0f5fa6df31226d9c3511ba2a41eb4a65200
-
Filesize
1KB
MD5aa047e0b013dea9eec11fe2f2a120dcc
SHA1dd7fe0f474204cd6c5c6da795999d4dad08d47f1
SHA256e21b56fe298bcd922eda3e7e4f2fc90d669f3b243a873b583413bed928246ddc
SHA512f7d1a1c0ee99221ab81814574bb8d518a02e00c19d70ac9a0c44178f4570a50f761348e2c3fcbdd293fd037c91738a88e8bc5f19a38bd78e27c6d2edba4f5156
-
Filesize
1KB
MD5aeecd2e7bcdc958cdd5326ad82352ec5
SHA14209a6b9d8895f08de9ab3c14f3ab03fc805c1a4
SHA256c4ff7547a2ecd269a98acea8ff77efbb8c991da0449afe175e823f8fc194ffb2
SHA51281e40b3c1c0e759de7e2c60d948a1d15ec911296c5b4d592e7b917a0fee2a24df7a5930b2b5a07122c7a0dd10828d5c87c193f797992ca7de086357805f11af4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
43KB
MD5b5cc96820c23ae9241f31f69ae0f4bd1
SHA12b34b1d40aaee3ad827f2f52c607078331bfa5d0
SHA256282393aa38b758eb429d55acbfc2df1638741ee18eaa2fccf1ea638e396c1606
SHA5123a08f0fa346c5a3823154d549c997aad2932c34c4d367729c89802a06029ae8dcdba9b053b93ebb279505f3aa96cdfa0d1addccd13065959be4fcec4553c15b0
-
Filesize
962B
MD5c17c6d47db7e7aea7ad88a65a7825b45
SHA1d02293c2df2ea36692f5c7c24618a9fcfdc3759b
SHA256e17ca503977e00cb6d9482f85655fb37e22b902e0624f0d21fa9e47d520b5518
SHA5126cc8842e1753cb01f4beea425f72ef4f999e3307d32018d716c2f5e1125bd7178841ddf8d882967dec287a62d849bb9ffb0a8b9c2441aa06d224a15da23a54fe