Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
ExcellentDll.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ExcellentDll.exe
Resource
win10v2004-20250217-en
General
-
Target
ExcellentDll.exe
-
Size
345KB
-
MD5
69f478046e3ef37a710a452f796c9ef9
-
SHA1
f577229b18661c30938b8dd158019370be32c1d1
-
SHA256
29774f3e9e2de12c7441f765f340cd661c38de279922961fc69488e2feffe67c
-
SHA512
ee8994cd121e7437d9affc77988852a71895d92aea268517adeb8bf62fc7b532ea507a03ddc05f9a449e5729201d908690f3a9ac5350832d5c7c01328257eea8
-
SSDEEP
6144:Q0mluu8NPetOlmfMYdTQJzLtxfg6vgR6TNX5vcQY2MRcViNpqbCtULop+mG:Cou80CKQBxfPvgR6TVcLsiNpqmwok5
Malware Config
Extracted
xworm
cameras-happen.gl.at.ply.gg:23386
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0063000000011c27-3.dat family_xworm behavioral1/memory/2980-14-0x0000000000D00000-0x0000000000D1A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2932 powershell.exe 2644 powershell.exe 1780 powershell.exe 2336 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ExcellentFree.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ExcellentFree.exe -
Executes dropped EXE 2 IoCs
pid Process 2980 ExcellentFree.exe 2860 ExLoader.exe -
Loads dropped DLL 2 IoCs
pid Process 2716 ExcellentDll.exe 2716 ExcellentDll.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" ExcellentFree.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExcellentDll.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2932 powershell.exe 2644 powershell.exe 1780 powershell.exe 2336 powershell.exe 2980 ExcellentFree.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2980 ExcellentFree.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 1780 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 2980 ExcellentFree.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2980 ExcellentFree.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2980 2716 ExcellentDll.exe 30 PID 2716 wrote to memory of 2980 2716 ExcellentDll.exe 30 PID 2716 wrote to memory of 2980 2716 ExcellentDll.exe 30 PID 2716 wrote to memory of 2980 2716 ExcellentDll.exe 30 PID 2716 wrote to memory of 2860 2716 ExcellentDll.exe 31 PID 2716 wrote to memory of 2860 2716 ExcellentDll.exe 31 PID 2716 wrote to memory of 2860 2716 ExcellentDll.exe 31 PID 2716 wrote to memory of 2860 2716 ExcellentDll.exe 31 PID 2980 wrote to memory of 2932 2980 ExcellentFree.exe 32 PID 2980 wrote to memory of 2932 2980 ExcellentFree.exe 32 PID 2980 wrote to memory of 2932 2980 ExcellentFree.exe 32 PID 2980 wrote to memory of 2644 2980 ExcellentFree.exe 34 PID 2980 wrote to memory of 2644 2980 ExcellentFree.exe 34 PID 2980 wrote to memory of 2644 2980 ExcellentFree.exe 34 PID 2980 wrote to memory of 1780 2980 ExcellentFree.exe 36 PID 2980 wrote to memory of 1780 2980 ExcellentFree.exe 36 PID 2980 wrote to memory of 1780 2980 ExcellentFree.exe 36 PID 2980 wrote to memory of 2336 2980 ExcellentFree.exe 38 PID 2980 wrote to memory of 2336 2980 ExcellentFree.exe 38 PID 2980 wrote to memory of 2336 2980 ExcellentFree.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExcellentDll.exe"C:\Users\Admin\AppData\Local\Temp\ExcellentDll.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe"C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ExcellentFree.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\ExLoader.exe"C:\Users\Admin\AppData\Local\Temp\ExLoader.exe"2⤵
- Executes dropped EXE
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD54183f8ec375a90742d38b1d69d136f92
SHA1a630ecdb41aaa0982fad2775dd6114d20a5e0081
SHA256ec8c87c21a99ec03772008304fe1a8a3261aa0beecafa7066c456069b66a33c6
SHA5125c23e9cfdadb4de5d57130d6fead4b072ee3034554d8ba17b0d8935eac75f8986f9648ca225ea3c10757fe888cc049634872ee0278953906a735f5242d8ac060
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c13e31a4f131af1d271edb92905d388c
SHA150b8790223621454c4658be8ce88a12aadd147ab
SHA256bab927a1f7d9dd42b8fa2bc180f4a6b1ccf7ce5b2300d582bb8d441519045010
SHA5129e9fa356733cbe0e141700d7e6f1bc19e2dcd32854f094ff9aeccec07a7bfe43b5301d474125fcd04f047990cfe7a8a28092ac9d014999c47e3268baa001787a
-
Filesize
76KB
MD58cc568f48114422b0ca792dc8ce6009a
SHA1bbe67dabd894ac2e45dc8027c6e3000f73ec97d7
SHA2567a3d86182ae45a6be17ef36d1f12463b398c165a7e6fe4aa80e56ceab7f036eb
SHA51245fe66a17c0473c0a4967d501d6f28f7a41fdce03ec31c46fb11ffd5fd848493578effbc36b4247ae49b987c41c3a559a9185dfdd0fd42468f30c310bea7bcc4