Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2025, 21:32

General

  • Target

    illict.gg.exe

  • Size

    56KB

  • MD5

    cc470d318018b2de7d43f6f17073016c

  • SHA1

    109d25fae3c9bd01a10d816d1db1c3c93c66c7c5

  • SHA256

    dd19ff97a15200e02ab698fe1087c4a6bfe89ac8852a057615b574bcbee961c2

  • SHA512

    036e7528e149a81cadf2185b99b63ca481b05bd909b462a6bc8daf4ccf4279a7c5cff99dfbe6e90df0b96a041aa99c4948384e207db916b093a166e92b8fea4f

  • SSDEEP

    1536:9j2/3YNHXwTyQl0RHskb0UlqXN+xD6QtGOxWq:xXw/8Mkb0Ux2OxWq

Malware Config

Extracted

Family

xworm

C2

80.76.49.15:1111

Attributes
  • Install_directory

    %AppData%

  • install_file

    Xclient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\illict.gg.exe
    "C:\Users\Admin\AppData\Local\Temp\illict.gg.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\illict.gg.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1784
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'illict.gg.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2700
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Xclient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2284
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Xclient.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2768
    • C:\Users\Admin\AppData\Local\Temp\naqknp.exe
      "C:\Users\Admin\AppData\Local\Temp\naqknp.exe"
      2⤵
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      PID:1772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\naqknp.exe

    Filesize

    188KB

    MD5

    14acdf9be02d33d3674041fb82fb1df4

    SHA1

    0191ae0a905df04be2771c4591d9847c15eb0fa3

    SHA256

    094d9b5aa73c4eee432d3b3e87b4ba55428f7a2064c5e7c79223bf7f4739ac17

    SHA512

    5215222472ff7049571d2e28316b0edadac18f27faef89ec6652c0de696403dbfd0f9b45a5af08012f4a96d72301790ce28787e7a3b65151e79120f8f3a2c18d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E8WXHMTLGIWDGL8K2ZQ6.temp

    Filesize

    7KB

    MD5

    772bfd9d0ca3e5b12a5c94ca4a35123d

    SHA1

    1ba43bd4752b5dd09fe8fec06e13bbf0184af814

    SHA256

    223b3bbe364fdf056f20f3167233d7516e4f5887206712d6a54686875814f6a2

    SHA512

    99041d2d17e025cbb0c1a79b009a3797a61ad95e253267db1acbe9b8e90e14121ad3c2e3db97aad9e737706929c8398665df4379edfad72e11344c7c22c33ade

  • memory/1772-50-0x00000000000B0000-0x00000000001E4000-memory.dmp

    Filesize

    1.2MB

  • memory/1772-51-0x00000000000B0000-0x00000000001E4000-memory.dmp

    Filesize

    1.2MB

  • memory/1772-55-0x00000000000B0000-0x00000000001E4000-memory.dmp

    Filesize

    1.2MB

  • memory/1772-54-0x00000000000B0000-0x00000000001E4000-memory.dmp

    Filesize

    1.2MB

  • memory/1772-53-0x00000000000B0000-0x00000000001E4000-memory.dmp

    Filesize

    1.2MB

  • memory/1772-52-0x00000000000B0000-0x00000000001E4000-memory.dmp

    Filesize

    1.2MB

  • memory/1772-47-0x00000000000B0000-0x00000000001E4000-memory.dmp

    Filesize

    1.2MB

  • memory/1772-46-0x00000000000B0000-0x00000000001E4000-memory.dmp

    Filesize

    1.2MB

  • memory/1772-45-0x00000000000B0000-0x00000000001E4000-memory.dmp

    Filesize

    1.2MB

  • memory/1772-41-0x00000000000B0000-0x00000000001E4000-memory.dmp

    Filesize

    1.2MB

  • memory/1772-39-0x00000000000B0000-0x00000000001E4000-memory.dmp

    Filesize

    1.2MB

  • memory/1784-8-0x0000000002960000-0x0000000002968000-memory.dmp

    Filesize

    32KB

  • memory/1784-6-0x0000000002EA0000-0x0000000002F20000-memory.dmp

    Filesize

    512KB

  • memory/1784-7-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

    Filesize

    2.9MB

  • memory/2068-1-0x00000000001A0000-0x00000000001B4000-memory.dmp

    Filesize

    80KB

  • memory/2068-33-0x000000001B340000-0x000000001B3C0000-memory.dmp

    Filesize

    512KB

  • memory/2068-32-0x000007FEF5573000-0x000007FEF5574000-memory.dmp

    Filesize

    4KB

  • memory/2068-31-0x000000001B340000-0x000000001B3C0000-memory.dmp

    Filesize

    512KB

  • memory/2068-0-0x000007FEF5573000-0x000007FEF5574000-memory.dmp

    Filesize

    4KB

  • memory/2700-15-0x0000000001EE0000-0x0000000001EE8000-memory.dmp

    Filesize

    32KB

  • memory/2700-14-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

    Filesize

    2.9MB