Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/01/2025, 00:32

General

  • Target

    Crypter Jynx.exe

  • Size

    1.5MB

  • MD5

    d370fed0475e39de8843e54c3dfbd9d4

  • SHA1

    294f2be4a06061b11ed53946e23ae70d305eb77a

  • SHA256

    01d2705a45a1217a55c4dfd27c91d8ffe69b74088e450ac20a162fc61169fd7a

  • SHA512

    d8041e531975a0ec554446a4a918e49d9d5e502d71ae5208012f9c5b26ae2c3fb749f49a9389580d5bf549e276a3f319229cbe1bc6a8c251e73fc52387a953a2

  • SSDEEP

    24576:favnKiLNkwxE2olHKy4vUHuwN+4xeGPF17oiUFUKE+1YpW2J6BZDMdogJ6FS8:faiIXRiHj4cHi4h3U+KBWW28DMOo

Malware Config

Extracted

Family

xworm

C2

jynx.uncofig.com:1111

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Crypter Jynx.exe
    "C:\Users\Admin\AppData\Local\Temp\Crypter Jynx.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Roaming\helper.exe
      "C:\Users\Admin\AppData\Roaming\helper.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\helper.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3440
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'helper.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:68
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2100
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3200
    • C:\Users\Admin\AppData\Roaming\Phantom.exe
      "C:\Users\Admin\AppData\Roaming\Phantom.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    2979eabc783eaca50de7be23dd4eafcf

    SHA1

    d709ce5f3a06b7958a67e20870bfd95b83cad2ea

    SHA256

    006cca90e78fbb571532a83082ac6712721a34ea4b21f490058ffb3f521f4903

    SHA512

    92bc433990572d9427d0c93eef9bd1cc23fa00ed60dd0c9c983d87d3421e02ce3f156c6f88fe916ef6782dbf185cbce083bc0094f8c527f302be6a37d1c53aba

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    d8cb3e9459807e35f02130fad3f9860d

    SHA1

    5af7f32cb8a30e850892b15e9164030a041f4bd6

    SHA256

    2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68

    SHA512

    045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    da5c82b0e070047f7377042d08093ff4

    SHA1

    89d05987cd60828cca516c5c40c18935c35e8bd3

    SHA256

    77a94ef8c4258445d538a6006ffadb05afdf888f6f044e1e5466b981a07f16c5

    SHA512

    7360311a3c97b73dd3f6d7179cd979e0e20d69f380d38292447e17e369087d9dd5acb66cd0cbdd95ac4bfb16e5a1b86825f835a8d45b14ea9812102cff59704b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kx1qu3oi.ktg.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Phantom.exe

    Filesize

    1.5MB

    MD5

    77447f97bedafe2dc903866ad18e25d6

    SHA1

    aef3c31376a39c2fff32a5c0ee7807257e9f6108

    SHA256

    2d32e99c12044e303025702f893ff65cf9a1a3cbc4991129f8188ee055d943f4

    SHA512

    8cd0760429bc259fe3ac7712af143e60e432e27be958f9ff0a1d73ad1d8298dd45137ba06bdda506f3fba930dff905a2c7b814045a25ca081cf930f565976475

  • C:\Users\Admin\AppData\Roaming\helper.exe

    Filesize

    81KB

    MD5

    bac22f7b34e1324af3401020d4831867

    SHA1

    6240c0d1ab52a65738a958ca3c5e360f7f0a2b6f

    SHA256

    9541d84a204d6271f0ba7bdfa7513d7f555e7f73fbf0142acdb347b61a9f821d

    SHA512

    2f8d100c90b8a816504f64b594f1a6f7e300bd4f080d4926581f279dca594b7c8342ec941f175782b599cfdb823b60582097d045ba8b57a1826521dd1d283ab5

  • memory/1544-1-0x0000000000540000-0x00000000006D2000-memory.dmp

    Filesize

    1.6MB

  • memory/1544-0-0x00007FFE10933000-0x00007FFE10935000-memory.dmp

    Filesize

    8KB

  • memory/2184-23-0x0000000000360000-0x000000000037A000-memory.dmp

    Filesize

    104KB

  • memory/2184-88-0x000000001B010000-0x000000001B020000-memory.dmp

    Filesize

    64KB

  • memory/2184-86-0x00007FFE10930000-0x00007FFE113F1000-memory.dmp

    Filesize

    10.8MB

  • memory/2184-89-0x00000000022F0000-0x00000000022FC000-memory.dmp

    Filesize

    48KB

  • memory/2184-35-0x000000001B010000-0x000000001B020000-memory.dmp

    Filesize

    64KB

  • memory/2184-91-0x000000001E2D0000-0x000000001E3EE000-memory.dmp

    Filesize

    1.1MB

  • memory/2184-130-0x000000001E6D0000-0x000000001EA20000-memory.dmp

    Filesize

    3.3MB

  • memory/2184-26-0x00007FFE10930000-0x00007FFE113F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3440-41-0x000002457F9A0000-0x000002457F9C2000-memory.dmp

    Filesize

    136KB

  • memory/4896-28-0x000000007500E000-0x000000007500F000-memory.dmp

    Filesize

    4KB

  • memory/4896-33-0x0000000006620000-0x00000000066D0000-memory.dmp

    Filesize

    704KB

  • memory/4896-32-0x0000000075000000-0x00000000757B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4896-87-0x0000000075000000-0x00000000757B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4896-31-0x0000000005520000-0x000000000552A000-memory.dmp

    Filesize

    40KB

  • memory/4896-30-0x0000000005360000-0x00000000053F2000-memory.dmp

    Filesize

    584KB

  • memory/4896-29-0x0000000005B70000-0x0000000006114000-memory.dmp

    Filesize

    5.6MB

  • memory/4896-27-0x0000000000810000-0x000000000098A000-memory.dmp

    Filesize

    1.5MB