Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe
Resource
win10v2004-20241007-en
General
-
Target
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe
-
Size
337KB
-
MD5
a8bf7d1f42ce4fe13c76e01befe367fa
-
SHA1
add32173cf45061d651b75f8b7ab33f86fdfbee7
-
SHA256
310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8
-
SHA512
eba707226d114c4405b25b627ee38ba5b2c24cf353fdafd1d78dd90c0fed5de67a2c8c0846609ad7d554306191836667f00dd896d12215fd769c6f36f0f58e2d
-
SSDEEP
3072:rXjgxzi3Z80WaXjTa4X+oFM3bUiS75l/NTugUJV21KFpwqEBOrNoq98wSpvbUP:rzgxAZ82a4XrFXSlQqrR98XU
Malware Config
Extracted
xworm
185.84.161.66:5000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0002000000022af2-13.dat family_xworm behavioral2/memory/2504-23-0x0000000000390000-0x00000000003A8000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1612 powershell.exe 4528 powershell.exe 4284 powershell.exe 4656 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BLACKSUPER X.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk BLACKSUPER X.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk BLACKSUPER X.exe -
Executes dropped EXE 5 IoCs
pid Process 232 P00LCUE.exe 2504 BLACKSUPER X.exe 1216 XClient.exe 3496 XClient.exe 5056 XClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" BLACKSUPER X.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe 232 P00LCUE.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2504 BLACKSUPER X.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeDebugPrivilege 4284 powershell.exe Token: SeDebugPrivilege 4656 powershell.exe Token: SeDebugPrivilege 2504 BLACKSUPER X.exe Token: SeDebugPrivilege 1216 XClient.exe Token: SeDebugPrivilege 3496 XClient.exe Token: SeDebugPrivilege 5056 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2504 BLACKSUPER X.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1336 wrote to memory of 232 1336 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 87 PID 1336 wrote to memory of 232 1336 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 87 PID 1336 wrote to memory of 2504 1336 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 89 PID 1336 wrote to memory of 2504 1336 310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe 89 PID 232 wrote to memory of 4408 232 P00LCUE.exe 90 PID 232 wrote to memory of 4408 232 P00LCUE.exe 90 PID 232 wrote to memory of 1136 232 P00LCUE.exe 91 PID 232 wrote to memory of 1136 232 P00LCUE.exe 91 PID 2504 wrote to memory of 1612 2504 BLACKSUPER X.exe 96 PID 2504 wrote to memory of 1612 2504 BLACKSUPER X.exe 96 PID 2504 wrote to memory of 4528 2504 BLACKSUPER X.exe 99 PID 2504 wrote to memory of 4528 2504 BLACKSUPER X.exe 99 PID 2504 wrote to memory of 4284 2504 BLACKSUPER X.exe 101 PID 2504 wrote to memory of 4284 2504 BLACKSUPER X.exe 101 PID 2504 wrote to memory of 4656 2504 BLACKSUPER X.exe 105 PID 2504 wrote to memory of 4656 2504 BLACKSUPER X.exe 105 PID 2504 wrote to memory of 2024 2504 BLACKSUPER X.exe 107 PID 2504 wrote to memory of 2024 2504 BLACKSUPER X.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe"C:\Users\Admin\AppData\Local\Temp\310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"C:\Users\Admin\AppData\Local\Temp\P00LCUE.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1136
-
-
-
C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\BLACKSUPER X.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'BLACKSUPER X.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2024
-
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5056
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD5cae60f0ddddac635da71bba775a2c5b4
SHA1386f1a036af61345a7d303d45f5230e2df817477
SHA256b2dd636b7b0d3bfe44cef5e1175828b1fa7bd84d5563f54342944156ba996c16
SHA51228ed8a8bc132ef56971cfd7b517b17cdb74a7f8c247ef6bff232996210075e06aa58a415825a1e038cfb547ad3dc6882bf1ca1b68c5b360ef0512a1440850253
-
Filesize
944B
MD598baf5117c4fcec1692067d200c58ab3
SHA15b33a57b72141e7508b615e17fb621612cb8e390
SHA25630bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51
SHA512344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d
-
Filesize
69KB
MD52d58b179ec133f1016a2496a96c5da20
SHA1f5b59d6c3c382295d5d5fed1aed04342a7ab7f2e
SHA256ea9c924bd79e33535b8d6537da0a320ce89d6700697173397bb0a31341831a1b
SHA512486e8248f14d721519bd3701d8dfaf6b8e5af2bce02825fac078402c5ac4a1ceff72af2c36eb3a5c3006aaef0eb00ae8b2289d5a2b8b149e50e7bc7e2bad5abc
-
Filesize
49KB
MD582389acf1b04e8442fdafa7c49c29a97
SHA1573bbc1861498616a8fe79762de0fe3441e0ab21
SHA25670ef677a281065331f49877743d7674891ccb1e63023fbc17e4d6c2e9f28b27a
SHA5124d87d48265510da16fd22920bbbc4476278e1991b62584c320b020d53dcd7ca9b718d9f10750f63b25df1a741ef10369da013e880a3d979ef3faff9332fd3eb1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82