Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    109s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/01/2025, 09:58

General

  • Target

    08aaaa2767a0a4fd7eced1d065b7be7c0c67692b62b44bf4c69bf43bdbb9a348.exe

  • Size

    83KB

  • MD5

    36939c097b21a057cd3cf29bd7d2e24c

  • SHA1

    2d120533e21e0f4a5154deb56d552613c51e5a78

  • SHA256

    08aaaa2767a0a4fd7eced1d065b7be7c0c67692b62b44bf4c69bf43bdbb9a348

  • SHA512

    77e477f3cf131949f028e18ed6fe4903cd744ca47250e4728faa2b29ba9afa2259be6cbf29ffea9cdd7be13966b58faa47c4408e11048a9bc9ef88c1ef7a0522

  • SSDEEP

    1536:KOItpoEucVEhr9AOlcQQn8YTlbrfikUSNG6eqhyOXcY1VA38:TBEfefAOlHQ8YTlbrfi7SN2qYOXcYM38

Malware Config

Extracted

Family

xworm

C2

primary-organizing.gl.at.ply.gg:16003

Attributes
  • Install_directory

    %AppData%

  • install_file

    System.exe

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\08aaaa2767a0a4fd7eced1d065b7be7c0c67692b62b44bf4c69bf43bdbb9a348.exe
    "C:\Users\Admin\AppData\Local\Temp\08aaaa2767a0a4fd7eced1d065b7be7c0c67692b62b44bf4c69bf43bdbb9a348.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\08aaaa2767a0a4fd7eced1d065b7be7c0c67692b62b44bf4c69bf43bdbb9a348.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2760
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '08aaaa2767a0a4fd7eced1d065b7be7c0c67692b62b44bf4c69bf43bdbb9a348.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2824
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2672
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2176
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System" /tr "C:\Users\Admin\AppData\Roaming\System.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:812
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {54D8BEF1-4B3B-4D13-96F3-3DC45C25ADBC} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Roaming\System.exe
      C:\Users\Admin\AppData\Roaming\System.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1512
    • C:\Users\Admin\AppData\Roaming\System.exe
      C:\Users\Admin\AppData\Roaming\System.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    965a2ea8b62ae1eb2b519b5f3a22bdd0

    SHA1

    1541dfe224d326e7a82f27c50262655b1fd63d78

    SHA256

    e322aa3e40c114fcbc06740939e8e52a1d46ba8f1409f06951f4bc3a5ac81d27

    SHA512

    12d58a532af9baf71344a9d18cc9434319b3afd1312a451027a0bf9a77964f6fc26f535e86ce5718f1d9d3de5f393c6bb9b7edebe0aa13a0aec56692a7c960c5

  • C:\Users\Admin\AppData\Roaming\System.exe

    Filesize

    83KB

    MD5

    36939c097b21a057cd3cf29bd7d2e24c

    SHA1

    2d120533e21e0f4a5154deb56d552613c51e5a78

    SHA256

    08aaaa2767a0a4fd7eced1d065b7be7c0c67692b62b44bf4c69bf43bdbb9a348

    SHA512

    77e477f3cf131949f028e18ed6fe4903cd744ca47250e4728faa2b29ba9afa2259be6cbf29ffea9cdd7be13966b58faa47c4408e11048a9bc9ef88c1ef7a0522

  • memory/1512-37-0x0000000000110000-0x000000000012C000-memory.dmp

    Filesize

    112KB

  • memory/2508-40-0x0000000000EE0000-0x0000000000EFC000-memory.dmp

    Filesize

    112KB

  • memory/2760-7-0x0000000002CD0000-0x0000000002D50000-memory.dmp

    Filesize

    512KB

  • memory/2760-8-0x000000001B5A0000-0x000000001B882000-memory.dmp

    Filesize

    2.9MB

  • memory/2760-9-0x00000000022C0000-0x00000000022C8000-memory.dmp

    Filesize

    32KB

  • memory/2824-15-0x000000001B670000-0x000000001B952000-memory.dmp

    Filesize

    2.9MB

  • memory/2824-16-0x0000000002770000-0x0000000002778000-memory.dmp

    Filesize

    32KB

  • memory/2960-2-0x000007FEF5210000-0x000007FEF5BFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2960-0-0x000007FEF5213000-0x000007FEF5214000-memory.dmp

    Filesize

    4KB

  • memory/2960-28-0x000007FEF5213000-0x000007FEF5214000-memory.dmp

    Filesize

    4KB

  • memory/2960-33-0x000007FEF5210000-0x000007FEF5BFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2960-1-0x0000000000C60000-0x0000000000C7C000-memory.dmp

    Filesize

    112KB