Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
887s -
max time network
887s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/01/2025, 20:37
Behavioral task
behavioral1
Sample
nigger.exe
Resource
win7-20240903-en
General
-
Target
nigger.exe
-
Size
64KB
-
MD5
6f8774e5839ed8ed21449f097122f0d9
-
SHA1
666790bd8f79903fcb4788ed3ef6552bf2d7c340
-
SHA256
978edd60b16702006e25e55cbcc1e69c112e451dd19c649825980fb98019cec9
-
SHA512
9d371e4b2ce6c356a57a19fd1b070e67ccbc37fc206d1d8e6c3f2b444065d64664420d64f788c459fd4632a1f1b4bc850d10e5a0dd9b9b4667bdb8f4c3d09b53
-
SSDEEP
1536:yP2rvEPQLEMlRGvqzRXJ69b3XhNQpzO862MO1fQKvixfav:yP2rv8GTx9569b3kpuO1fQ5av
Malware Config
Extracted
xworm
memory-lottery.gl.at.ply.gg:4444
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 10 IoCs
resource yara_rule behavioral1/memory/2516-1-0x0000000000900000-0x0000000000916000-memory.dmp family_xworm behavioral1/files/0x000e000000012263-34.dat family_xworm behavioral1/memory/1716-36-0x0000000000040000-0x0000000000056000-memory.dmp family_xworm behavioral1/memory/1916-39-0x0000000001360000-0x0000000001376000-memory.dmp family_xworm behavioral1/memory/772-42-0x00000000001C0000-0x00000000001D6000-memory.dmp family_xworm behavioral1/memory/1092-45-0x00000000003B0000-0x00000000003C6000-memory.dmp family_xworm behavioral1/memory/1224-47-0x0000000000D90000-0x0000000000DA6000-memory.dmp family_xworm behavioral1/memory/2148-52-0x0000000000EE0000-0x0000000000EF6000-memory.dmp family_xworm behavioral1/memory/2872-56-0x0000000000170000-0x0000000000186000-memory.dmp family_xworm behavioral1/memory/2840-58-0x0000000000850000-0x0000000000866000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2956 powershell.exe 3060 powershell.exe 2836 powershell.exe 2832 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\security.lnk nigger.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\security.lnk nigger.exe -
Executes dropped EXE 15 IoCs
pid Process 1716 security 1916 security 1564 security 772 security 1220 security 1092 security 1224 security 736 security 2524 security 896 security 2148 security 2756 security 2960 security 2872 security 2840 security -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\security = "C:\\Users\\Admin\\AppData\\Roaming\\security" nigger.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2516 nigger.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2956 powershell.exe 3060 powershell.exe 2836 powershell.exe 2832 powershell.exe 2516 nigger.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2516 nigger.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 3060 powershell.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 2516 nigger.exe Token: SeDebugPrivilege 1716 security Token: SeDebugPrivilege 1916 security Token: SeDebugPrivilege 1564 security Token: SeDebugPrivilege 772 security Token: SeDebugPrivilege 1220 security Token: SeDebugPrivilege 1092 security Token: SeDebugPrivilege 1224 security Token: SeDebugPrivilege 736 security Token: SeDebugPrivilege 2524 security Token: SeDebugPrivilege 896 security Token: SeDebugPrivilege 2148 security Token: SeDebugPrivilege 2756 security Token: SeDebugPrivilege 2960 security Token: SeDebugPrivilege 2872 security Token: SeDebugPrivilege 2840 security -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2516 nigger.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2956 2516 nigger.exe 30 PID 2516 wrote to memory of 2956 2516 nigger.exe 30 PID 2516 wrote to memory of 2956 2516 nigger.exe 30 PID 2516 wrote to memory of 3060 2516 nigger.exe 32 PID 2516 wrote to memory of 3060 2516 nigger.exe 32 PID 2516 wrote to memory of 3060 2516 nigger.exe 32 PID 2516 wrote to memory of 2836 2516 nigger.exe 34 PID 2516 wrote to memory of 2836 2516 nigger.exe 34 PID 2516 wrote to memory of 2836 2516 nigger.exe 34 PID 2516 wrote to memory of 2832 2516 nigger.exe 36 PID 2516 wrote to memory of 2832 2516 nigger.exe 36 PID 2516 wrote to memory of 2832 2516 nigger.exe 36 PID 2516 wrote to memory of 2696 2516 nigger.exe 38 PID 2516 wrote to memory of 2696 2516 nigger.exe 38 PID 2516 wrote to memory of 2696 2516 nigger.exe 38 PID 2024 wrote to memory of 1716 2024 taskeng.exe 42 PID 2024 wrote to memory of 1716 2024 taskeng.exe 42 PID 2024 wrote to memory of 1716 2024 taskeng.exe 42 PID 2024 wrote to memory of 1916 2024 taskeng.exe 43 PID 2024 wrote to memory of 1916 2024 taskeng.exe 43 PID 2024 wrote to memory of 1916 2024 taskeng.exe 43 PID 2024 wrote to memory of 1564 2024 taskeng.exe 44 PID 2024 wrote to memory of 1564 2024 taskeng.exe 44 PID 2024 wrote to memory of 1564 2024 taskeng.exe 44 PID 2024 wrote to memory of 772 2024 taskeng.exe 45 PID 2024 wrote to memory of 772 2024 taskeng.exe 45 PID 2024 wrote to memory of 772 2024 taskeng.exe 45 PID 2024 wrote to memory of 1220 2024 taskeng.exe 46 PID 2024 wrote to memory of 1220 2024 taskeng.exe 46 PID 2024 wrote to memory of 1220 2024 taskeng.exe 46 PID 2024 wrote to memory of 1092 2024 taskeng.exe 47 PID 2024 wrote to memory of 1092 2024 taskeng.exe 47 PID 2024 wrote to memory of 1092 2024 taskeng.exe 47 PID 2024 wrote to memory of 1224 2024 taskeng.exe 48 PID 2024 wrote to memory of 1224 2024 taskeng.exe 48 PID 2024 wrote to memory of 1224 2024 taskeng.exe 48 PID 2024 wrote to memory of 736 2024 taskeng.exe 49 PID 2024 wrote to memory of 736 2024 taskeng.exe 49 PID 2024 wrote to memory of 736 2024 taskeng.exe 49 PID 2024 wrote to memory of 2524 2024 taskeng.exe 50 PID 2024 wrote to memory of 2524 2024 taskeng.exe 50 PID 2024 wrote to memory of 2524 2024 taskeng.exe 50 PID 2024 wrote to memory of 896 2024 taskeng.exe 51 PID 2024 wrote to memory of 896 2024 taskeng.exe 51 PID 2024 wrote to memory of 896 2024 taskeng.exe 51 PID 2024 wrote to memory of 2148 2024 taskeng.exe 52 PID 2024 wrote to memory of 2148 2024 taskeng.exe 52 PID 2024 wrote to memory of 2148 2024 taskeng.exe 52 PID 2024 wrote to memory of 2756 2024 taskeng.exe 53 PID 2024 wrote to memory of 2756 2024 taskeng.exe 53 PID 2024 wrote to memory of 2756 2024 taskeng.exe 53 PID 2024 wrote to memory of 2960 2024 taskeng.exe 54 PID 2024 wrote to memory of 2960 2024 taskeng.exe 54 PID 2024 wrote to memory of 2960 2024 taskeng.exe 54 PID 2024 wrote to memory of 2872 2024 taskeng.exe 55 PID 2024 wrote to memory of 2872 2024 taskeng.exe 55 PID 2024 wrote to memory of 2872 2024 taskeng.exe 55 PID 2024 wrote to memory of 2840 2024 taskeng.exe 56 PID 2024 wrote to memory of 2840 2024 taskeng.exe 56 PID 2024 wrote to memory of 2840 2024 taskeng.exe 56 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\nigger.exe"C:\Users\Admin\AppData\Local\Temp\nigger.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\nigger.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'nigger.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\security'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'security'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "security" /tr "C:\Users\Admin\AppData\Roaming\security"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2696
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7016A0C8-63F2-443A-A85B-CDD36707F657} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XNYB3LX02R3M8HY9VOLR.temp
Filesize7KB
MD50297a32ff2c3ccf13df31d81e72057e9
SHA1a2480128e4ef9e61ed8ae6c2bca43cdaf7e1e2e5
SHA256d76f5188a1220cf3aa46f16a6b49b3417a9aacd7d002157723d3e00b9a711dc3
SHA512e8be8d1a6cec389a31332f073bb5c4e7d9d17cc8c343c3d3694a8b10aa4b55167e32bdfa44d7cf661d85aff2557e90931621eb1701843823bda5993c5128d23a
-
Filesize
64KB
MD56f8774e5839ed8ed21449f097122f0d9
SHA1666790bd8f79903fcb4788ed3ef6552bf2d7c340
SHA256978edd60b16702006e25e55cbcc1e69c112e451dd19c649825980fb98019cec9
SHA5129d371e4b2ce6c356a57a19fd1b070e67ccbc37fc206d1d8e6c3f2b444065d64664420d64f788c459fd4632a1f1b4bc850d10e5a0dd9b9b4667bdb8f4c3d09b53