Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    20s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20/01/2025, 07:13

General

  • Target

    spoofer.exe

  • Size

    69KB

  • MD5

    3d4aee4d0038725b015d28e56770bbf9

  • SHA1

    82c009d268a3695b76b4a32229089323a3c14f14

  • SHA256

    95e5b66131e63d29c869dec3213d170689aed33f3df2ee0e52de61ad6add1f4e

  • SHA512

    2d658a5a96866ebd21948dbec7305af78829fc23fd5f6e9fe980f1ed4a803f953c4a181197bc8dc1d8e970bc45db9a1930af6111933414a9621654864d567817

  • SSDEEP

    1536:Y2busqfcOZYTe23/kJ+rbLU8C3dbCab4mpcVM/d1pY6YnOc0CvvC4Gy:a5ekqL6bCaUMDknObs/Gy

Malware Config

Extracted

Family

xworm

C2

rate-motel.gl.at.ply.gg:26173

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\spoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\spoofer.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\spoofer.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2740
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'spoofer.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2788
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SYSTEM'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2608
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SYSTEM'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    5405018bb5b14cd8490afdfbae76300e

    SHA1

    252eddbf4c7b599730402ea44354eb4b964c654d

    SHA256

    818ae7ea0dbe17ae7048dfb65f6635a0d21cbc050a42ef63cf20fedd1c29467b

    SHA512

    d7e334bc00d1f80bd4d89505dd3cb48f748de03ecebb3d775a50779394e6922d169593b0836f5986a6c4e084aca4978481437c4ebf4b981bedf13b5b1cd32849

  • memory/908-0-0x000007FEF5E93000-0x000007FEF5E94000-memory.dmp

    Filesize

    4KB

  • memory/908-1-0x0000000000EE0000-0x0000000000EF8000-memory.dmp

    Filesize

    96KB

  • memory/908-2-0x000007FEF5E90000-0x000007FEF687C000-memory.dmp

    Filesize

    9.9MB

  • memory/908-28-0x000007FEF5E93000-0x000007FEF5E94000-memory.dmp

    Filesize

    4KB

  • memory/908-33-0x000007FEF5E90000-0x000007FEF687C000-memory.dmp

    Filesize

    9.9MB

  • memory/2740-7-0x0000000002970000-0x00000000029F0000-memory.dmp

    Filesize

    512KB

  • memory/2740-8-0x000000001B610000-0x000000001B8F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2740-9-0x0000000001D90000-0x0000000001D98000-memory.dmp

    Filesize

    32KB

  • memory/2788-15-0x000000001B5B0000-0x000000001B892000-memory.dmp

    Filesize

    2.9MB

  • memory/2788-16-0x0000000002290000-0x0000000002298000-memory.dmp

    Filesize

    32KB