Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe
Resource
win10v2004-20241007-en
General
-
Target
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe
-
Size
337KB
-
MD5
a8bf7d1f42ce4fe13c76e01befe367fa
-
SHA1
add32173cf45061d651b75f8b7ab33f86fdfbee7
-
SHA256
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8
-
SHA512
eba707226d114c4405b25b627ee38ba5b2c24cf353fdafd1d78dd90c0fed5de67a2c8c0846609ad7d554306191836667f00dd896d12215fd769c6f36f0f58e2d
-
SSDEEP
3072:rXjgxzi3Z80WaXjTa4X+oFM3bUiS75l/NTugUJV21KFpwqEBOrNoq98wSpvbUP:rzgxAZ82a4XrFXSlQqrR98XU
Malware Config
Extracted
xworm
185.84.161.66:5000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x0008000000016c9d-10.dat family_xworm behavioral1/memory/2552-13-0x0000000000B10000-0x0000000000B28000-memory.dmp family_xworm behavioral1/memory/748-51-0x00000000003C0000-0x00000000003D8000-memory.dmp family_xworm behavioral1/memory/1708-54-0x0000000000FC0000-0x0000000000FD8000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2660 powershell.exe 2700 powershell.exe 1116 powershell.exe 2936 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk BLACKSUPER X.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk BLACKSUPER X.exe -
Executes dropped EXE 6 IoCs
pid Process 1592 P00LCUE.exe 2552 BLACKSUPER X.exe 1152 Process not Found 748 XClient.exe 1708 XClient.exe 1800 XClient.exe -
Loads dropped DLL 2 IoCs
pid Process 1904 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 2716 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" BLACKSUPER X.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe 1592 P00LCUE.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2552 BLACKSUPER X.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 1116 powershell.exe Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 2552 BLACKSUPER X.exe Token: SeDebugPrivilege 748 XClient.exe Token: SeDebugPrivilege 1708 XClient.exe Token: SeDebugPrivilege 1800 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2552 BLACKSUPER X.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1592 1904 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 30 PID 1904 wrote to memory of 1592 1904 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 30 PID 1904 wrote to memory of 1592 1904 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 30 PID 1904 wrote to memory of 2552 1904 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 32 PID 1904 wrote to memory of 2552 1904 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 32 PID 1904 wrote to memory of 2552 1904 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 32 PID 1592 wrote to memory of 2508 1592 P00LCUE.exe 33 PID 1592 wrote to memory of 2508 1592 P00LCUE.exe 33 PID 1592 wrote to memory of 2508 1592 P00LCUE.exe 33 PID 1592 wrote to memory of 2744 1592 P00LCUE.exe 34 PID 1592 wrote to memory of 2744 1592 P00LCUE.exe 34 PID 1592 wrote to memory of 2744 1592 P00LCUE.exe 34 PID 2552 wrote to memory of 2660 2552 BLACKSUPER X.exe 36 PID 2552 wrote to memory of 2660 2552 BLACKSUPER X.exe 36 PID 2552 wrote to memory of 2660 2552 BLACKSUPER X.exe 36 PID 2552 wrote to memory of 2700 2552 BLACKSUPER X.exe 38 PID 2552 wrote to memory of 2700 2552 BLACKSUPER X.exe 38 PID 2552 wrote to memory of 2700 2552 BLACKSUPER X.exe 38 PID 2552 wrote to memory of 1116 2552 BLACKSUPER X.exe 40 PID 2552 wrote to memory of 1116 2552 BLACKSUPER X.exe 40 PID 2552 wrote to memory of 1116 2552 BLACKSUPER X.exe 40 PID 2552 wrote to memory of 2936 2552 BLACKSUPER X.exe 42 PID 2552 wrote to memory of 2936 2552 BLACKSUPER X.exe 42 PID 2552 wrote to memory of 2936 2552 BLACKSUPER X.exe 42 PID 2552 wrote to memory of 3028 2552 BLACKSUPER X.exe 44 PID 2552 wrote to memory of 3028 2552 BLACKSUPER X.exe 44 PID 2552 wrote to memory of 3028 2552 BLACKSUPER X.exe 44 PID 2408 wrote to memory of 748 2408 taskeng.exe 48 PID 2408 wrote to memory of 748 2408 taskeng.exe 48 PID 2408 wrote to memory of 748 2408 taskeng.exe 48 PID 2408 wrote to memory of 1708 2408 taskeng.exe 49 PID 2408 wrote to memory of 1708 2408 taskeng.exe 49 PID 2408 wrote to memory of 1708 2408 taskeng.exe 49 PID 2408 wrote to memory of 1800 2408 taskeng.exe 50 PID 2408 wrote to memory of 1800 2408 taskeng.exe 50 PID 2408 wrote to memory of 1800 2408 taskeng.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe"C:\Users\Admin\AppData\Local\Temp\310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2744
-
-
-
C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'BLACKSUPER X.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3028
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {81956FF4-2B7B-4479-9632-8FB9B53DDF88} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD52d58b179ec133f1016a2496a96c5da20
SHA1f5b59d6c3c382295d5d5fed1aed04342a7ab7f2e
SHA256ea9c924bd79e33535b8d6537da0a320ce89d6700697173397bb0a31341831a1b
SHA512486e8248f14d721519bd3701d8dfaf6b8e5af2bce02825fac078402c5ac4a1ceff72af2c36eb3a5c3006aaef0eb00ae8b2289d5a2b8b149e50e7bc7e2bad5abc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5e52c847d85707fba3b216ce247083b83
SHA159c436ec4ec84edf53b9d812f335cb5d6f0efe08
SHA2563e1a3152c74813c214a4f2c402705aab7b1c2990da347ee8175031501aad78c9
SHA5127951bbd67a2efbe9c873f0b12f6df24f633adcb9934c07649bce458cdb168e2309c95107aa8305d1b7ab96f058d2eeeca04a9bab7fae9718d6226e7140a88c5b
-
Filesize
49KB
MD582389acf1b04e8442fdafa7c49c29a97
SHA1573bbc1861498616a8fe79762de0fe3441e0ab21
SHA25670ef677a281065331f49877743d7674891ccb1e63023fbc17e4d6c2e9f28b27a
SHA5124d87d48265510da16fd22920bbbc4476278e1991b62584c320b020d53dcd7ca9b718d9f10750f63b25df1a741ef10369da013e880a3d979ef3faff9332fd3eb1