Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 21:32
Behavioral task
behavioral1
Sample
illict.gg.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
illict.gg.exe
Resource
win10v2004-20250217-en
General
-
Target
illict.gg.exe
-
Size
56KB
-
MD5
cc470d318018b2de7d43f6f17073016c
-
SHA1
109d25fae3c9bd01a10d816d1db1c3c93c66c7c5
-
SHA256
dd19ff97a15200e02ab698fe1087c4a6bfe89ac8852a057615b574bcbee961c2
-
SHA512
036e7528e149a81cadf2185b99b63ca481b05bd909b462a6bc8daf4ccf4279a7c5cff99dfbe6e90df0b96a041aa99c4948384e207db916b093a166e92b8fea4f
-
SSDEEP
1536:9j2/3YNHXwTyQl0RHskb0UlqXN+xD6QtGOxWq:xXw/8Mkb0Ux2OxWq
Malware Config
Extracted
xworm
80.76.49.15:1111
-
Install_directory
%AppData%
-
install_file
Xclient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2068-1-0x00000000001A0000-0x00000000001B4000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1784 powershell.exe 2700 powershell.exe 2284 powershell.exe 2768 powershell.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" naqknp.exe -
Disables Task Manager via registry modification
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Xclient.lnk illict.gg.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Xclient.lnk illict.gg.exe -
Executes dropped EXE 1 IoCs
pid Process 1772 naqknp.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 naqknp.exe -
resource yara_rule behavioral1/files/0x0004000000004ed7-38.dat upx behavioral1/memory/1772-39-0x00000000000B0000-0x00000000001E4000-memory.dmp upx behavioral1/memory/1772-41-0x00000000000B0000-0x00000000001E4000-memory.dmp upx behavioral1/memory/1772-45-0x00000000000B0000-0x00000000001E4000-memory.dmp upx behavioral1/memory/1772-46-0x00000000000B0000-0x00000000001E4000-memory.dmp upx behavioral1/memory/1772-47-0x00000000000B0000-0x00000000001E4000-memory.dmp upx behavioral1/memory/1772-50-0x00000000000B0000-0x00000000001E4000-memory.dmp upx behavioral1/memory/1772-51-0x00000000000B0000-0x00000000001E4000-memory.dmp upx behavioral1/memory/1772-52-0x00000000000B0000-0x00000000001E4000-memory.dmp upx behavioral1/memory/1772-53-0x00000000000B0000-0x00000000001E4000-memory.dmp upx behavioral1/memory/1772-54-0x00000000000B0000-0x00000000001E4000-memory.dmp upx behavioral1/memory/1772-55-0x00000000000B0000-0x00000000001E4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language naqknp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1784 powershell.exe 2700 powershell.exe 2284 powershell.exe 2768 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2068 illict.gg.exe Token: SeDebugPrivilege 1784 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 2068 illict.gg.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1784 2068 illict.gg.exe 31 PID 2068 wrote to memory of 1784 2068 illict.gg.exe 31 PID 2068 wrote to memory of 1784 2068 illict.gg.exe 31 PID 2068 wrote to memory of 2700 2068 illict.gg.exe 33 PID 2068 wrote to memory of 2700 2068 illict.gg.exe 33 PID 2068 wrote to memory of 2700 2068 illict.gg.exe 33 PID 2068 wrote to memory of 2284 2068 illict.gg.exe 35 PID 2068 wrote to memory of 2284 2068 illict.gg.exe 35 PID 2068 wrote to memory of 2284 2068 illict.gg.exe 35 PID 2068 wrote to memory of 2768 2068 illict.gg.exe 37 PID 2068 wrote to memory of 2768 2068 illict.gg.exe 37 PID 2068 wrote to memory of 2768 2068 illict.gg.exe 37 PID 2068 wrote to memory of 1772 2068 illict.gg.exe 40 PID 2068 wrote to memory of 1772 2068 illict.gg.exe 40 PID 2068 wrote to memory of 1772 2068 illict.gg.exe 40 PID 2068 wrote to memory of 1772 2068 illict.gg.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\illict.gg.exe"C:\Users\Admin\AppData\Local\Temp\illict.gg.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\illict.gg.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'illict.gg.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Xclient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Xclient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\naqknp.exe"C:\Users\Admin\AppData\Local\Temp\naqknp.exe"2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD514acdf9be02d33d3674041fb82fb1df4
SHA10191ae0a905df04be2771c4591d9847c15eb0fa3
SHA256094d9b5aa73c4eee432d3b3e87b4ba55428f7a2064c5e7c79223bf7f4739ac17
SHA5125215222472ff7049571d2e28316b0edadac18f27faef89ec6652c0de696403dbfd0f9b45a5af08012f4a96d72301790ce28787e7a3b65151e79120f8f3a2c18d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E8WXHMTLGIWDGL8K2ZQ6.temp
Filesize7KB
MD5772bfd9d0ca3e5b12a5c94ca4a35123d
SHA11ba43bd4752b5dd09fe8fec06e13bbf0184af814
SHA256223b3bbe364fdf056f20f3167233d7516e4f5887206712d6a54686875814f6a2
SHA51299041d2d17e025cbb0c1a79b009a3797a61ad95e253267db1acbe9b8e90e14121ad3c2e3db97aad9e737706929c8398665df4379edfad72e11344c7c22c33ade