Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
18/11/2024, 16:30
Behavioral task
behavioral1
Sample
8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe
Resource
win7-20241023-en
General
-
Target
8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe
-
Size
867KB
-
MD5
bed3b5ce30d2d279d91945bf705477bc
-
SHA1
75c2cdb2cb3f9632aa1d6ec42a4ee5a5a995198f
-
SHA256
8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69
-
SHA512
87415c6be1238aa20dfcadadd17f63e7651f552292e36f32ed8e29e36346433346b29447db75eb935316692b95d85e7b0e8b22d1f8997485a67e997e29f36b79
-
SSDEEP
12288:i98NVBjvwSRz04lj4k/GG6yY5adl8M64mzx8B/wmtilK6yEbx9H:vV9vT5lj4MGdyY5SWv4mM/eyErH
Malware Config
Extracted
xworm
45.84.199.152:7000
-
Install_directory
%Public%
-
install_file
Msedge.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x000b000000012280-2.dat family_xworm behavioral1/memory/2992-4-0x00000000001C0000-0x00000000001F8000-memory.dmp family_xworm behavioral1/memory/1352-35-0x0000000000C10000-0x0000000000C48000-memory.dmp family_xworm behavioral1/memory/568-38-0x0000000001130000-0x0000000001168000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2596 powershell.exe 2020 powershell.exe 1048 powershell.exe 2440 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Msedge.lnk msedge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Msedge.lnk msedge.exe -
Executes dropped EXE 3 IoCs
pid Process 2992 msedge.exe 1352 Msedge.exe 568 Msedge.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\msedge.exe 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2504 cmd.exe 1040 cmd.exe -
Kills process with taskkill 4 IoCs
pid Process 2120 taskkill.exe 2332 taskkill.exe 2560 taskkill.exe 320 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2440 powershell.exe 2596 powershell.exe 2020 powershell.exe 1048 powershell.exe 2992 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2120 taskkill.exe Token: SeDebugPrivilege 2332 taskkill.exe Token: SeDebugPrivilege 2560 taskkill.exe Token: SeDebugPrivilege 320 taskkill.exe Token: SeDebugPrivilege 2992 msedge.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 1048 powershell.exe Token: SeDebugPrivilege 2992 msedge.exe Token: SeDebugPrivilege 1352 Msedge.exe Token: SeDebugPrivilege 568 Msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2336 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 31 PID 3032 wrote to memory of 2336 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 31 PID 3032 wrote to memory of 2336 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 31 PID 2336 wrote to memory of 2120 2336 cmd.exe 32 PID 2336 wrote to memory of 2120 2336 cmd.exe 32 PID 2336 wrote to memory of 2120 2336 cmd.exe 32 PID 3032 wrote to memory of 2504 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 34 PID 3032 wrote to memory of 2504 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 34 PID 3032 wrote to memory of 2504 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 34 PID 2504 wrote to memory of 2332 2504 cmd.exe 35 PID 2504 wrote to memory of 2332 2504 cmd.exe 35 PID 2504 wrote to memory of 2332 2504 cmd.exe 35 PID 3032 wrote to memory of 1040 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 36 PID 3032 wrote to memory of 1040 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 36 PID 3032 wrote to memory of 1040 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 36 PID 1040 wrote to memory of 2560 1040 cmd.exe 37 PID 1040 wrote to memory of 2560 1040 cmd.exe 37 PID 1040 wrote to memory of 2560 1040 cmd.exe 37 PID 3032 wrote to memory of 1796 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 38 PID 3032 wrote to memory of 1796 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 38 PID 3032 wrote to memory of 1796 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 38 PID 1796 wrote to memory of 320 1796 cmd.exe 39 PID 1796 wrote to memory of 320 1796 cmd.exe 39 PID 1796 wrote to memory of 320 1796 cmd.exe 39 PID 3032 wrote to memory of 2964 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 40 PID 3032 wrote to memory of 2964 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 40 PID 3032 wrote to memory of 2964 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 40 PID 3032 wrote to memory of 2976 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 41 PID 3032 wrote to memory of 2976 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 41 PID 3032 wrote to memory of 2976 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 41 PID 2976 wrote to memory of 2992 2976 cmd.exe 42 PID 2976 wrote to memory of 2992 2976 cmd.exe 42 PID 2976 wrote to memory of 2992 2976 cmd.exe 42 PID 3032 wrote to memory of 2968 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 43 PID 3032 wrote to memory of 2968 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 43 PID 3032 wrote to memory of 2968 3032 8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe 43 PID 2968 wrote to memory of 2816 2968 cmd.exe 44 PID 2968 wrote to memory of 2816 2968 cmd.exe 44 PID 2968 wrote to memory of 2816 2968 cmd.exe 44 PID 2968 wrote to memory of 2296 2968 cmd.exe 45 PID 2968 wrote to memory of 2296 2968 cmd.exe 45 PID 2968 wrote to memory of 2296 2968 cmd.exe 45 PID 2968 wrote to memory of 2960 2968 cmd.exe 46 PID 2968 wrote to memory of 2960 2968 cmd.exe 46 PID 2968 wrote to memory of 2960 2968 cmd.exe 46 PID 2992 wrote to memory of 2440 2992 msedge.exe 48 PID 2992 wrote to memory of 2440 2992 msedge.exe 48 PID 2992 wrote to memory of 2440 2992 msedge.exe 48 PID 2992 wrote to memory of 2596 2992 msedge.exe 50 PID 2992 wrote to memory of 2596 2992 msedge.exe 50 PID 2992 wrote to memory of 2596 2992 msedge.exe 50 PID 2992 wrote to memory of 2020 2992 msedge.exe 52 PID 2992 wrote to memory of 2020 2992 msedge.exe 52 PID 2992 wrote to memory of 2020 2992 msedge.exe 52 PID 2992 wrote to memory of 1048 2992 msedge.exe 54 PID 2992 wrote to memory of 1048 2992 msedge.exe 54 PID 2992 wrote to memory of 1048 2992 msedge.exe 54 PID 2992 wrote to memory of 1768 2992 msedge.exe 56 PID 2992 wrote to memory of 1768 2992 msedge.exe 56 PID 2992 wrote to memory of 1768 2992 msedge.exe 56 PID 1544 wrote to memory of 1352 1544 taskeng.exe 59 PID 1544 wrote to memory of 1352 1544 taskeng.exe 59 PID 1544 wrote to memory of 1352 1544 taskeng.exe 59 PID 1544 wrote to memory of 568 1544 taskeng.exe 60 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe"C:\Users\Admin\AppData\Local\Temp\8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM EpicGamesLauncher.exe /F2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\taskkill.exetaskkill /IM EpicGamesLauncher.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM FortniteClient-Win64-Shipping_BE.exe /F2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\taskkill.exetaskkill /IM FortniteClient-Win64-Shipping_BE.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM FortniteClient-Win64-Shipping.exe /F2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\system32\taskkill.exetaskkill /IM FortniteClient-Win64-Shipping.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM x64dbg.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\taskkill.exetaskkill /IM x64dbg.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\msedge.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\msedge.exeC:\Windows\msedge.exe3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\Msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Msedge.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Msedge" /tr "C:\Users\Public\Msedge.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1768
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\8e70da39f632e60160cc39e7960fe8026c07fe1556c3248a8fe94bdd738f6f69.exe" MD53⤵PID:2816
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2296
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2960
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E448C98F-A7EC-4D40-AD5B-659F38C410F1} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Public\Msedge.exeC:\Users\Public\Msedge.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Users\Public\Msedge.exeC:\Users\Public\Msedge.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD54e40e418b614b8b0ecc3e0949f99e7a8
SHA1f71cc43697d461ee5b407582201a47f9501c71d7
SHA256188c48ca55ba6955b366a333bd6d9d6955cd4abd3aa1658f804409adfaef225c
SHA5126907181a40ed44bde09a8037319d19a5336071e6cf4c116559e56ec3d6952f719d00c0f2a5453aec80956082040d04a969a1ca14e33d7a9fe1e48c79cd0558fb
-
Filesize
204KB
MD54738e3496a3efe5f19c57b764eb5ba9b
SHA1da9163944b1f51438b2602cbc95660af43172065
SHA256cb51764f19e66bb6accd7f0418332bac7759073ed245f0633dddd53f68e81933
SHA5124cb3029e136471edf2ebb46d1e4fc3a70e5138a5bd4b3fb182b6746d00c69fd5cf8822c0c90c2bcb4d8276db0cecac16ea0198e18a44e755a340495b19cc2238