Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
30/12/2024, 20:44
241230-zjcjfazrhy 826/11/2024, 18:42
241126-xche1atnb1 826/11/2024, 18:41
241126-xbwk8stnat 411/04/2024, 09:32
240411-lhs8xagf79 1011/04/2024, 09:21
240411-lbmgsage63 10Analysis
-
max time kernel
840s -
max time network
845s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/12/2024, 20:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.upload.ee/download/15657107/813ac1d2bfa81d7f177e/XWorm-V5.0.rar
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
https://www.upload.ee/download/15657107/813ac1d2bfa81d7f177e/XWorm-V5.0.rar
Resource
win11-20241007-en
General
-
Target
https://www.upload.ee/download/15657107/813ac1d2bfa81d7f177e/XWorm-V5.0.rar
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 1600 msedge.exe 1600 msedge.exe 932 identity_helper.exe 932 identity_helper.exe 872 msedge.exe 872 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1704 1600 msedge.exe 77 PID 1600 wrote to memory of 1704 1600 msedge.exe 77 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 4212 1600 msedge.exe 78 PID 1600 wrote to memory of 2792 1600 msedge.exe 79 PID 1600 wrote to memory of 2792 1600 msedge.exe 79 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80 PID 1600 wrote to memory of 476 1600 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.upload.ee/download/15657107/813ac1d2bfa81d7f177e/XWorm-V5.0.rar1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff72a53cb8,0x7fff72a53cc8,0x7fff72a53cd82⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6608 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6792 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6824 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,17646287829269989911,14327387731426060059,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1544690d41d950f9c1358068301cfb5
SHA1ae3ff81363fcbe33c419e49cabef61fb6837bffa
SHA25653d69c9cc3c8aaf2c8b58ea6a2aa47c49c9ec11167dd9414cd9f4192f9978724
SHA5121e4f1fe2877f4f947d33490e65898752488e48de34d61e197e4448127d6b1926888de80b62349d5a88b96140eed0a5b952ef4dd7ca318689f76e12630c9029da
-
Filesize
152B
MD59314124f4f0ad9f845a0d7906fd8dfd8
SHA10d4f67fb1a11453551514f230941bdd7ef95693c
SHA256cbd58fa358e4b1851c3da2d279023c29eba66fb4d438c6e87e7ce5169ffb910e
SHA51287b9060ca4942974bd8f95b8998df7b2702a3f4aba88c53b2e3423a532a75407070368f813a5bbc0251864b4eae47e015274a839999514386d23c8a526d05d85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\076258cf-a7a9-48aa-8fb9-c014c3139991.tmp
Filesize5KB
MD56a3b38cd338084b1441640c75517a79d
SHA1efcdce9000740a34226da920112133f9b3e675a2
SHA256c86b174fb8c4524df035801e852a22c865e43ed4bdb394ea401ba117038af4e6
SHA51286bdac9497c39c349534fb5c09630c54314776cb5c3b85c695997ff1804846a76bcdcc9d9212ab420cbb0beaf91d2b5daf5171cc5b37ff6ec3166a3b8add6d47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5605c9c019c1f2567e1de8c941575c796
SHA1d9399e30f0f6cec1ce4d357a848e3e7111693897
SHA256a7cc7c632e6ccac1616e3bd91a0deaa8c4b2d90e52a68d609a5e9486ca6e46b4
SHA512a472a58b89860cb78e46314e5dd2d3b0e55e3d7a872b867e2680c72941d5f56e12b5a5a8721e156b8cf7e3ff810755e37fbd5f55dbb3c16dc85a084cc8b33169
-
Filesize
2KB
MD5d52662f90db02d7f8d7f860163d91a1a
SHA1607d44114aabc45bffb259c112dd0d01aa81fb28
SHA256b5c4437ab8de8564a2d18c806a9f7fe4abffbd9247d1125f7dc5d6101c409648
SHA512fc9488838792ba4f20172b74293568fe0370c74d817c4579ac93ea2a54cffa035307ef43471f5cbde4b2f19f2a1627af6e31c9edbc39f375f7517c6d576c5e23
-
Filesize
6KB
MD5ec9a29641525cdef816238026ca379db
SHA1cd5c0c9a8da28196e8743d9a99f5c0c6e43338a6
SHA256793877be95c447ebee32d352d92d6132e77d6435fde1980d4dd124342bdcc1be
SHA512238875c665ae023956c3b81fb90402053643c08158cde114ab4bb63a62b14b782a81bcf644edb313f576d4a58f35f6e2f4eaba80e0e8311f39941569d744bc0f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD596f3ec6c5df0f2ff750d83ab566b02d4
SHA16761882bc2be838ce7e9951dee131478736f7ed1
SHA2564c2748a49f268d7b25dd7b4b3f081c7d010e4a5c743b7187cd73ea24fc3c2413
SHA51238a7b7f905a01bd11a8b31dc9cafefabccb3392d5ac46ad9242d6aed3932bb2b634bd78ff0726dbc0b5c253a43ef4f34dddbc34af2778d0639a8b0d5e594bb31