Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 15:43 UTC
Behavioral task
behavioral1
Sample
ExcellentFree.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ExcellentFree.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
ExcellentFree.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
ExcellentFree.exe
-
Size
76KB
-
MD5
8cc568f48114422b0ca792dc8ce6009a
-
SHA1
bbe67dabd894ac2e45dc8027c6e3000f73ec97d7
-
SHA256
7a3d86182ae45a6be17ef36d1f12463b398c165a7e6fe4aa80e56ceab7f036eb
-
SHA512
45fe66a17c0473c0a4967d501d6f28f7a41fdce03ec31c46fb11ffd5fd848493578effbc36b4247ae49b987c41c3a559a9185dfdd0fd42468f30c310bea7bcc4
-
SSDEEP
1536:p1TUp7kYt63AuSN5z5UJrh+bILdScPA6BiHGOwKZRWX2emk:1YY32Uf+bmMe7OHZRvemk
Malware Config
Extracted
xworm
cameras-happen.gl.at.ply.gg:23386
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2532-1-0x0000000000920000-0x000000000093A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2328 powershell.exe 2836 powershell.exe 2860 powershell.exe 2608 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ExcellentFree.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ExcellentFree.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" ExcellentFree.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2328 powershell.exe 2836 powershell.exe 2860 powershell.exe 2608 powershell.exe 2532 ExcellentFree.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2532 ExcellentFree.exe Token: SeDebugPrivilege 2328 powershell.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 2532 ExcellentFree.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2532 ExcellentFree.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2328 2532 ExcellentFree.exe 31 PID 2532 wrote to memory of 2328 2532 ExcellentFree.exe 31 PID 2532 wrote to memory of 2328 2532 ExcellentFree.exe 31 PID 2532 wrote to memory of 2836 2532 ExcellentFree.exe 33 PID 2532 wrote to memory of 2836 2532 ExcellentFree.exe 33 PID 2532 wrote to memory of 2836 2532 ExcellentFree.exe 33 PID 2532 wrote to memory of 2860 2532 ExcellentFree.exe 35 PID 2532 wrote to memory of 2860 2532 ExcellentFree.exe 35 PID 2532 wrote to memory of 2860 2532 ExcellentFree.exe 35 PID 2532 wrote to memory of 2608 2532 ExcellentFree.exe 37 PID 2532 wrote to memory of 2608 2532 ExcellentFree.exe 37 PID 2532 wrote to memory of 2608 2532 ExcellentFree.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe"C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ExcellentFree.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
Network
-
Remote address:8.8.8.8:53Requestcameras-happen.gl.at.ply.ggIN AResponsecameras-happen.gl.at.ply.ggIN A147.185.221.20
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52075320a9091d5de6dbaaa3935954810
SHA1bd0c03966e3a8d7ad5b04d3c0b93f55097b75046
SHA256e95fe4ecfe9c507424f1dbd97c2209ccc6f74510b6a143a3aa19b4e3f87e16d4
SHA5121d7a2f525524d8565536db5e601bbc5efba64e66b1beefc781e419cdf04597ea7f41b2ffe55a8afe692cbaec25323c71ee10fd459ff00459a73b95e749caa3c6