Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/01/2025, 16:05
Behavioral task
behavioral1
Sample
svchost.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
svchost.scr
Resource
win10v2004-20241007-en
General
-
Target
svchost.scr
-
Size
79KB
-
MD5
0b192c8ec04f4dcd360957eb478221d2
-
SHA1
522a5c7336a31c23efec4b8ccab7ce7c17d620d4
-
SHA256
ea6a26539f74891663a03fc3cf348ef53c14295ef3662b9a29b211a8d0503e1c
-
SHA512
7d5dd7c9aca799a8dc15eea9bf767ca6c7e2145ad848d2b2cefb3548cffb30bbbb3e3933aac7c602e4a1b5f02e14e46b7edbcc3945e1aa2e3cc6219941e90eb6
-
SSDEEP
1536:bN9+rzFV4eo/7Bd53gXby6WVhodFa/6BAMOgepesq:bNneo/1fqbyd+iQAMOg5sq
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
-
Install_directory
%LocalAppData%
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/1996-1-0x0000000000360000-0x000000000037A000-memory.dmp family_xworm behavioral1/files/0x00150000000054a9-32.dat family_xworm behavioral1/memory/1408-34-0x0000000000D20000-0x0000000000D3A000-memory.dmp family_xworm behavioral1/memory/916-37-0x00000000002D0000-0x00000000002EA000-memory.dmp family_xworm behavioral1/memory/1656-39-0x0000000000120000-0x000000000013A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2792 powershell.exe 2808 powershell.exe 2844 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.scr File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.scr -
Executes dropped EXE 3 IoCs
pid Process 1408 svchost.scr 916 svchost.scr 1656 svchost.scr -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\svchost.scr" svchost.scr -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 svchost.scr Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 svchost.scr -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2792 powershell.exe 2808 powershell.exe 2844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1996 svchost.scr Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeDebugPrivilege 1996 svchost.scr Token: SeDebugPrivilege 1408 svchost.scr Token: SeDebugPrivilege 916 svchost.scr Token: SeDebugPrivilege 1656 svchost.scr -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2792 1996 svchost.scr 32 PID 1996 wrote to memory of 2792 1996 svchost.scr 32 PID 1996 wrote to memory of 2792 1996 svchost.scr 32 PID 1996 wrote to memory of 2808 1996 svchost.scr 34 PID 1996 wrote to memory of 2808 1996 svchost.scr 34 PID 1996 wrote to memory of 2808 1996 svchost.scr 34 PID 1996 wrote to memory of 2844 1996 svchost.scr 36 PID 1996 wrote to memory of 2844 1996 svchost.scr 36 PID 1996 wrote to memory of 2844 1996 svchost.scr 36 PID 1996 wrote to memory of 3032 1996 svchost.scr 38 PID 1996 wrote to memory of 3032 1996 svchost.scr 38 PID 1996 wrote to memory of 3032 1996 svchost.scr 38 PID 2732 wrote to memory of 1408 2732 taskeng.exe 41 PID 2732 wrote to memory of 1408 2732 taskeng.exe 41 PID 2732 wrote to memory of 1408 2732 taskeng.exe 41 PID 2732 wrote to memory of 916 2732 taskeng.exe 42 PID 2732 wrote to memory of 916 2732 taskeng.exe 42 PID 2732 wrote to memory of 916 2732 taskeng.exe 42 PID 2732 wrote to memory of 1656 2732 taskeng.exe 44 PID 2732 wrote to memory of 1656 2732 taskeng.exe 44 PID 2732 wrote to memory of 1656 2732 taskeng.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.scr"C:\Users\Admin\AppData\Local\Temp\svchost.scr" /S1⤵
- Drops startup file
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.scr'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.scr'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\svchost.scr'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\svchost.scr"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3032
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {18E37F53-49D1-4165-9CEF-7111E4B0B8AA} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\svchost.scrC:\Users\Admin\AppData\Local\svchost.scr "C:\Users\Admin\AppData\Local\svchost.scr"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Users\Admin\AppData\Local\svchost.scrC:\Users\Admin\AppData\Local\svchost.scr "C:\Users\Admin\AppData\Local\svchost.scr"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Users\Admin\AppData\Local\svchost.scrC:\Users\Admin\AppData\Local\svchost.scr "C:\Users\Admin\AppData\Local\svchost.scr"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD50b192c8ec04f4dcd360957eb478221d2
SHA1522a5c7336a31c23efec4b8ccab7ce7c17d620d4
SHA256ea6a26539f74891663a03fc3cf348ef53c14295ef3662b9a29b211a8d0503e1c
SHA5127d5dd7c9aca799a8dc15eea9bf767ca6c7e2145ad848d2b2cefb3548cffb30bbbb3e3933aac7c602e4a1b5f02e14e46b7edbcc3945e1aa2e3cc6219941e90eb6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f5eaa1e429bde9dda7c9eea5dc917d1a
SHA196822205708b3fc50c898721d35caeca5813bdca
SHA25609481339ec68bf5a728d2a4064076c6e547355b7f7d49020840523528faa7708
SHA512c94cc9bc9d61a16626c3afc76edb19ebd4ad29bc7cfc3c6a6afed558b0f1eeb69bf0fc5b418b1a6c862ee0af0cc7a07d5d46fdb3f66a8129e9eeeebfe27b05c6