Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
FPS_BY FILMGODX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
FPS_BY FILMGODX.exe
Resource
win11-20241007-en
General
-
Target
FPS_BY FILMGODX.exe
-
Size
98KB
-
MD5
20f5290def51514fefaed2b744ed961c
-
SHA1
546f5c611c1d35c5104e2792c76934746f637987
-
SHA256
3e6f0de70c94df15b3aecb8ce4370e26b62fa38a24bf3710d0d9f0a28b4da656
-
SHA512
578c4cc3b0375587d13f4b6f28d063322aa4df1dc3a439bc2f22da57475d191b78f7cc6590483ba4462af5a70d7aa73fb6784ae527e46f8e64cb31b3274ef3e2
-
SSDEEP
3072:gZtcSVYnM7ByozguHogUDqGB5xY7iBCYs9:gXFyaByoUuInqs0
Malware Config
Extracted
xworm
45.141.27.248:7777
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c96-9.dat family_xworm behavioral1/memory/4676-17-0x0000000000F40000-0x0000000000F5A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 440 powershell.exe 3692 powershell.exe 1616 powershell.exe 5012 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation FPS_BY FILMGODX.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation svchost.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 4676 svchost.exe 3524 svchost.exe -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 3672 takeown.exe 1720 takeown.exe 4976 takeown.exe 4080 takeown.exe 4940 takeown.exe 2552 takeown.exe 3980 takeown.exe 1200 takeown.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Power Settings 1 TTPs 3 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1140 powercfg.exe 756 powercfg.exe 2856 powercfg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3612 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 440 powershell.exe 440 powershell.exe 3692 powershell.exe 3692 powershell.exe 1616 powershell.exe 1616 powershell.exe 5012 powershell.exe 5012 powershell.exe 4676 svchost.exe 4676 svchost.exe 4676 svchost.exe 4676 svchost.exe 4676 svchost.exe 4676 svchost.exe 4676 svchost.exe 4676 svchost.exe 4676 svchost.exe 4676 svchost.exe 4676 svchost.exe 4676 svchost.exe 4676 svchost.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 4676 svchost.exe Token: SeDebugPrivilege 440 powershell.exe Token: SeDebugPrivilege 3692 powershell.exe Token: SeDebugPrivilege 1616 powershell.exe Token: SeDebugPrivilege 5012 powershell.exe Token: SeDebugPrivilege 4676 svchost.exe Token: SeDebugPrivilege 3524 svchost.exe Token: SeShutdownPrivilege 1140 powercfg.exe Token: SeCreatePagefilePrivilege 1140 powercfg.exe Token: SeShutdownPrivilege 756 powercfg.exe Token: SeCreatePagefilePrivilege 756 powercfg.exe Token: SeShutdownPrivilege 2856 powercfg.exe Token: SeCreatePagefilePrivilege 2856 powercfg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4676 svchost.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2692 wrote to memory of 380 2692 FPS_BY FILMGODX.exe 83 PID 2692 wrote to memory of 380 2692 FPS_BY FILMGODX.exe 83 PID 2692 wrote to memory of 4676 2692 FPS_BY FILMGODX.exe 85 PID 2692 wrote to memory of 4676 2692 FPS_BY FILMGODX.exe 85 PID 380 wrote to memory of 3300 380 cmd.exe 86 PID 380 wrote to memory of 3300 380 cmd.exe 86 PID 380 wrote to memory of 4216 380 cmd.exe 87 PID 380 wrote to memory of 4216 380 cmd.exe 87 PID 380 wrote to memory of 4900 380 cmd.exe 88 PID 380 wrote to memory of 4900 380 cmd.exe 88 PID 4676 wrote to memory of 440 4676 svchost.exe 95 PID 4676 wrote to memory of 440 4676 svchost.exe 95 PID 4676 wrote to memory of 3692 4676 svchost.exe 97 PID 4676 wrote to memory of 3692 4676 svchost.exe 97 PID 4676 wrote to memory of 1616 4676 svchost.exe 99 PID 4676 wrote to memory of 1616 4676 svchost.exe 99 PID 4676 wrote to memory of 5012 4676 svchost.exe 101 PID 4676 wrote to memory of 5012 4676 svchost.exe 101 PID 4676 wrote to memory of 3612 4676 svchost.exe 103 PID 4676 wrote to memory of 3612 4676 svchost.exe 103 PID 380 wrote to memory of 1140 380 cmd.exe 121 PID 380 wrote to memory of 1140 380 cmd.exe 121 PID 380 wrote to memory of 756 380 cmd.exe 122 PID 380 wrote to memory of 756 380 cmd.exe 122 PID 380 wrote to memory of 2856 380 cmd.exe 123 PID 380 wrote to memory of 2856 380 cmd.exe 123 PID 380 wrote to memory of 2552 380 cmd.exe 124 PID 380 wrote to memory of 2552 380 cmd.exe 124 PID 380 wrote to memory of 3980 380 cmd.exe 125 PID 380 wrote to memory of 3980 380 cmd.exe 125 PID 380 wrote to memory of 1200 380 cmd.exe 126 PID 380 wrote to memory of 1200 380 cmd.exe 126 PID 380 wrote to memory of 3672 380 cmd.exe 127 PID 380 wrote to memory of 3672 380 cmd.exe 127 PID 380 wrote to memory of 1720 380 cmd.exe 128 PID 380 wrote to memory of 1720 380 cmd.exe 128 PID 380 wrote to memory of 4976 380 cmd.exe 129 PID 380 wrote to memory of 4976 380 cmd.exe 129 PID 380 wrote to memory of 4080 380 cmd.exe 130 PID 380 wrote to memory of 4080 380 cmd.exe 130 PID 380 wrote to memory of 4940 380 cmd.exe 131 PID 380 wrote to memory of 4940 380 cmd.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\FPS_BY FILMGODX.exe"C:\Users\Admin\AppData\Local\Temp\FPS_BY FILMGODX.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\FPS_BY FILMGODX.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\system32\mode.comMode 100,253⤵PID:3300
-
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:4216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "prompt #$H#$E# & echo on & for %b in (1) do rem"3⤵PID:4900
-
-
C:\Windows\system32\powercfg.exepowercfg -delete 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c3⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Windows\system32\powercfg.exepowercfg -delete 381b4222-f694-41f0-9685-ff5bb260df2e3⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Windows\system32\powercfg.exepowercfg -delete a1841308-3541-4fab-bc81-f71556f20b4a3⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Users\Admin\AppData\Local\Temp" /r /d y3⤵
- Modifies file permissions
PID:2552
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\Temp" /r /d y3⤵
- Modifies file permissions
PID:3980
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\Temp" /r /d y3⤵
- Modifies file permissions
PID:1200
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Users\Admin\AppData\Local\Temp /r /d y3⤵
- Modifies file permissions
PID:3672
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Users\Admin\AppData\Local\Temp" /r /d y3⤵
- Modifies file permissions
PID:1720
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Users\Admin\AppData\Local\Temp" /r /d y3⤵
- Modifies file permissions
PID:4976
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\Temp" /r /d y3⤵
- Modifies file permissions
PID:4080
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\Temp" /r /d y3⤵
- Modifies file permissions
PID:4940
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3612
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3524
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
Filesize
944B
MD5307f2ff88aa5285fefdac601d8e516b2
SHA1adc77c4b60b0e3e0caf606cdfa12a14ac1114877
SHA2560ab5bc86fe7d968023b8aefc17f229251ca596e4a7436581d921d762fdd6d569
SHA5126cbd566c374841aae8a056dd83d570da5d583ee8c110a69e2cf840a4dc975a925e57f772449c7c805df51b8ecce2831e139509238bebe0b4b1d4a47d12182918
-
Filesize
944B
MD5205f6010c033eefc37d63d8ce846bce4
SHA1417b1aabb447765a2aa149529a1f4f52ded194ea
SHA256993dbee9fb487dbdff56c09a1df360ea68b583bd8b28b2c315ec9d92639f3697
SHA512c6bbd60c82ffbc3297d1d355ab3c6692de97da0b3bdd60ea4aacec6d27d360341cefa11a4411d7b8877d54d1177b48f4dc003e2a391031cc1a304b177689bfaf
-
Filesize
1B
MD58277e0910d750195b448797616e091ad
SHA13c363836cf4e16666669a25da280a1865c2d2874
SHA25618ac3e7343f016890c510e93f935261169d9e3f565436429830faf0934f4f8e4
SHA51248fb10b15f3d44a09dc82d02b06581e0c0c69478c9fd2cf8f9093659019a1687baecdbb38c9e72b12169dc4148690f87467f9154f5931c5df665c6496cbfd5f5
-
Filesize
53B
MD5c6ec36c570d7088bf926449f5efcd352
SHA1f778819a4da8c4df90e908a12d808328a4a0b07d
SHA2569bccc169b00d530bfc1f516e364f0f4cffd3580cc8591734588235ec5b8c7318
SHA512a916d81b4ae30663d0d2c9843de0ecc45af1ac80daebd65430399aa876e06f85a00b3a18a82c1db2cb9dd07e736394511fa92131b8aca2002dfaf5975e52ae3f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD573fa858851ab9f0cb193111d183a3ba5
SHA13b6b20d02ce3e39a45b94984d150009e6ea501cb
SHA256c63a1b8c63acb2c4cab3617934a7a88a7b7dc19a2a1144b7f1b1207ff95f26bb
SHA512a08237eff698b5fee0909d1fc71a317d64408fd6cce378a259f7d3ac52577a927b553a10182d5d6552868d21a41a961760f49a987bbbaeadabefeee659457ba4
-
Filesize
77KB
MD5a50564ade45c0a409bb38c06673d6ab9
SHA191fd3510c4ccdc50d0eb08249c945271171d5f9f
SHA256120b13c9edbd9f2fff0ca2e31efb17cef3cac1ea1b4025e8bc7b512f74021a6e
SHA5127fb99769609027e850c5d6d69912b5dfe82025f24947fa9bff8d88a966ffda315dee8c77086ef171cf75089b6b4d6cb98975b53cbba040c40af50248c4f65cd0