Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/01/2025, 16:19
250122-tsmg4swjcl 1022/01/2025, 16:17
250122-trdtksvrhj 1022/01/2025, 16:14
250122-tpwllsvrdj 1022/01/2025, 16:12
250122-tnlp1svjc1 1022/01/2025, 16:10
250122-tml96avqem 1022/01/2025, 16:09
250122-tlwgfatrgs 1022/01/2025, 13:40
250122-qylwzsymez 10Analysis
-
max time kernel
62s -
max time network
66s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22/01/2025, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
idk.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
idk.exe
-
Size
94KB
-
MD5
f88781b7415e7b04fd13b1bbbf2009b2
-
SHA1
df9072bf61727db083155c04b47ce48744b23ee5
-
SHA256
ccaf48cc722a2f0f9766cc4e83c1469e498fc67d2f8ed96942a5764d3591050e
-
SHA512
6c16f8287f2f14b452025be0638fb827fa6e4a3556b21119c6195bc066d577f2c1df9a8b3f500f7e56d2b33e0552c7cbec8730bd3ac14704a6250280b1aac3db
-
SSDEEP
1536:BItB2JRcId+cS7K/aATFcmJi1vJYbmG0VaTCVp8tA8qbQXpPQ8Qep+MDaj361dw:CyFdDSWjB0vcL0VwCz8+8qbwPtVkOg3r
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
-
Install_directory
%LocalAppData%
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x002a0000000461b1-6.dat family_xworm behavioral1/memory/1160-11-0x0000000000590000-0x00000000005AA000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5000 powershell.exe 2432 powershell.exe 3048 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation idk.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation svchost.scr -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.scr File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.scr -
Executes dropped EXE 1 IoCs
pid Process 1160 svchost.scr -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\svchost.scr" svchost.scr -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5000 powershell.exe 5000 powershell.exe 2432 powershell.exe 2432 powershell.exe 3048 powershell.exe 3048 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1160 svchost.scr Token: SeDebugPrivilege 5000 powershell.exe Token: SeIncreaseQuotaPrivilege 5000 powershell.exe Token: SeSecurityPrivilege 5000 powershell.exe Token: SeTakeOwnershipPrivilege 5000 powershell.exe Token: SeLoadDriverPrivilege 5000 powershell.exe Token: SeSystemProfilePrivilege 5000 powershell.exe Token: SeSystemtimePrivilege 5000 powershell.exe Token: SeProfSingleProcessPrivilege 5000 powershell.exe Token: SeIncBasePriorityPrivilege 5000 powershell.exe Token: SeCreatePagefilePrivilege 5000 powershell.exe Token: SeBackupPrivilege 5000 powershell.exe Token: SeRestorePrivilege 5000 powershell.exe Token: SeShutdownPrivilege 5000 powershell.exe Token: SeDebugPrivilege 5000 powershell.exe Token: SeSystemEnvironmentPrivilege 5000 powershell.exe Token: SeRemoteShutdownPrivilege 5000 powershell.exe Token: SeUndockPrivilege 5000 powershell.exe Token: SeManageVolumePrivilege 5000 powershell.exe Token: 33 5000 powershell.exe Token: 34 5000 powershell.exe Token: 35 5000 powershell.exe Token: 36 5000 powershell.exe Token: SeDebugPrivilege 2432 powershell.exe Token: SeIncreaseQuotaPrivilege 2432 powershell.exe Token: SeSecurityPrivilege 2432 powershell.exe Token: SeTakeOwnershipPrivilege 2432 powershell.exe Token: SeLoadDriverPrivilege 2432 powershell.exe Token: SeSystemProfilePrivilege 2432 powershell.exe Token: SeSystemtimePrivilege 2432 powershell.exe Token: SeProfSingleProcessPrivilege 2432 powershell.exe Token: SeIncBasePriorityPrivilege 2432 powershell.exe Token: SeCreatePagefilePrivilege 2432 powershell.exe Token: SeBackupPrivilege 2432 powershell.exe Token: SeRestorePrivilege 2432 powershell.exe Token: SeShutdownPrivilege 2432 powershell.exe Token: SeDebugPrivilege 2432 powershell.exe Token: SeSystemEnvironmentPrivilege 2432 powershell.exe Token: SeRemoteShutdownPrivilege 2432 powershell.exe Token: SeUndockPrivilege 2432 powershell.exe Token: SeManageVolumePrivilege 2432 powershell.exe Token: 33 2432 powershell.exe Token: 34 2432 powershell.exe Token: 35 2432 powershell.exe Token: 36 2432 powershell.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeIncreaseQuotaPrivilege 3048 powershell.exe Token: SeSecurityPrivilege 3048 powershell.exe Token: SeTakeOwnershipPrivilege 3048 powershell.exe Token: SeLoadDriverPrivilege 3048 powershell.exe Token: SeSystemProfilePrivilege 3048 powershell.exe Token: SeSystemtimePrivilege 3048 powershell.exe Token: SeProfSingleProcessPrivilege 3048 powershell.exe Token: SeIncBasePriorityPrivilege 3048 powershell.exe Token: SeCreatePagefilePrivilege 3048 powershell.exe Token: SeBackupPrivilege 3048 powershell.exe Token: SeRestorePrivilege 3048 powershell.exe Token: SeShutdownPrivilege 3048 powershell.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeSystemEnvironmentPrivilege 3048 powershell.exe Token: SeRemoteShutdownPrivilege 3048 powershell.exe Token: SeUndockPrivilege 3048 powershell.exe Token: SeManageVolumePrivilege 3048 powershell.exe Token: 33 3048 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2892 wrote to memory of 1160 2892 idk.exe 81 PID 2892 wrote to memory of 1160 2892 idk.exe 81 PID 1160 wrote to memory of 5000 1160 svchost.scr 86 PID 1160 wrote to memory of 5000 1160 svchost.scr 86 PID 1160 wrote to memory of 2432 1160 svchost.scr 90 PID 1160 wrote to memory of 2432 1160 svchost.scr 90 PID 1160 wrote to memory of 3048 1160 svchost.scr 92 PID 1160 wrote to memory of 3048 1160 svchost.scr 92 PID 1160 wrote to memory of 1028 1160 svchost.scr 95 PID 1160 wrote to memory of 1028 1160 svchost.scr 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\idk.exe"C:\Users\Admin\AppData\Local\Temp\idk.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\svchost.scr"C:\Users\Admin\AppData\Roaming\svchost.scr" /S2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\svchost.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\svchost.scr"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1028
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵PID:2648
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b9cd68b5f314b5190f27a211d3506df0
SHA160c891d9a3c857fda4b75576420a54d38054c544
SHA2568908f5cb47ad8627c2af37f08e4f42734cb8dd761734d27fb7745ca522e0018e
SHA5121565a76680cf17ec9426dacab318124ff6374243e19550616069cd1a6149f356bb6f90ea524fbddce2082631be85831d5cb3a118d53c2c15c82096100b5b6182
-
Filesize
1KB
MD5afbe17edbe24a5dc9232448dc6af0473
SHA1a0c590634f0fea9e7d695e48f81f9f8df5c3241c
SHA256fd12da9190f5462d577f2da09c75a62f480edc92cd81f9a31746929464d5d794
SHA51278ff509839ec2047b7ddacbec3755ecc7d3f9002a886ada3f3fa02afe06c4c0e0cae0c385893fdeaf48d22c5904f74783936010014a50310e0895050c0aa57ab
-
Filesize
1KB
MD561d3041ee4a5b61df98145d9d2cdd603
SHA1114be44a52f4ef601419fe6c263f1986c38e87fd
SHA25669407efa02fcc993b202e147192fa3448996a8998d11150d9a613e0719266bca
SHA512dfd778377868d40d1710e2d79092e44731458af2dac8bd7664ec053e98b30613310406ef6306d207eba34031f6f9abf490093dbffd1e9f37dde72c74b00ae8d8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
79KB
MD50b192c8ec04f4dcd360957eb478221d2
SHA1522a5c7336a31c23efec4b8ccab7ce7c17d620d4
SHA256ea6a26539f74891663a03fc3cf348ef53c14295ef3662b9a29b211a8d0503e1c
SHA5127d5dd7c9aca799a8dc15eea9bf767ca6c7e2145ad848d2b2cefb3548cffb30bbbb3e3933aac7c602e4a1b5f02e14e46b7edbcc3945e1aa2e3cc6219941e90eb6