Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
28/02/2025, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
ExcellentDll.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ExcellentDll.exe
Resource
win10v2004-20250217-en
General
-
Target
ExcellentDll.exe
-
Size
345KB
-
MD5
69f478046e3ef37a710a452f796c9ef9
-
SHA1
f577229b18661c30938b8dd158019370be32c1d1
-
SHA256
29774f3e9e2de12c7441f765f340cd661c38de279922961fc69488e2feffe67c
-
SHA512
ee8994cd121e7437d9affc77988852a71895d92aea268517adeb8bf62fc7b532ea507a03ddc05f9a449e5729201d908690f3a9ac5350832d5c7c01328257eea8
-
SSDEEP
6144:Q0mluu8NPetOlmfMYdTQJzLtxfg6vgR6TNX5vcQY2MRcViNpqbCtULop+mG:Cou80CKQBxfPvgR6TVcLsiNpqmwok5
Malware Config
Extracted
xworm
cameras-happen.gl.at.ply.gg:23386
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral3/files/0x000e000000027d59-4.dat family_xworm behavioral3/memory/4604-29-0x0000000000310000-0x000000000032A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3424 powershell.exe 4872 powershell.exe 3800 powershell.exe 2212 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3996797005-1442104920-3698332314-1000\Control Panel\International\Geo\Nation ExcellentDll.exe Key value queried \REGISTRY\USER\S-1-5-21-3996797005-1442104920-3698332314-1000\Control Panel\International\Geo\Nation ExcellentFree.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ExcellentFree.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ExcellentFree.exe -
Executes dropped EXE 2 IoCs
pid Process 4604 ExcellentFree.exe 1700 ExLoader.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3996797005-1442104920-3698332314-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" ExcellentFree.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExcellentDll.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3424 powershell.exe 3424 powershell.exe 4872 powershell.exe 4872 powershell.exe 3800 powershell.exe 3800 powershell.exe 2212 powershell.exe 2212 powershell.exe 4604 ExcellentFree.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4604 ExcellentFree.exe Token: SeDebugPrivilege 3424 powershell.exe Token: SeIncreaseQuotaPrivilege 3424 powershell.exe Token: SeSecurityPrivilege 3424 powershell.exe Token: SeTakeOwnershipPrivilege 3424 powershell.exe Token: SeLoadDriverPrivilege 3424 powershell.exe Token: SeSystemProfilePrivilege 3424 powershell.exe Token: SeSystemtimePrivilege 3424 powershell.exe Token: SeProfSingleProcessPrivilege 3424 powershell.exe Token: SeIncBasePriorityPrivilege 3424 powershell.exe Token: SeCreatePagefilePrivilege 3424 powershell.exe Token: SeBackupPrivilege 3424 powershell.exe Token: SeRestorePrivilege 3424 powershell.exe Token: SeShutdownPrivilege 3424 powershell.exe Token: SeDebugPrivilege 3424 powershell.exe Token: SeSystemEnvironmentPrivilege 3424 powershell.exe Token: SeRemoteShutdownPrivilege 3424 powershell.exe Token: SeUndockPrivilege 3424 powershell.exe Token: SeManageVolumePrivilege 3424 powershell.exe Token: 33 3424 powershell.exe Token: 34 3424 powershell.exe Token: 35 3424 powershell.exe Token: 36 3424 powershell.exe Token: SeDebugPrivilege 4872 powershell.exe Token: SeIncreaseQuotaPrivilege 4872 powershell.exe Token: SeSecurityPrivilege 4872 powershell.exe Token: SeTakeOwnershipPrivilege 4872 powershell.exe Token: SeLoadDriverPrivilege 4872 powershell.exe Token: SeSystemProfilePrivilege 4872 powershell.exe Token: SeSystemtimePrivilege 4872 powershell.exe Token: SeProfSingleProcessPrivilege 4872 powershell.exe Token: SeIncBasePriorityPrivilege 4872 powershell.exe Token: SeCreatePagefilePrivilege 4872 powershell.exe Token: SeBackupPrivilege 4872 powershell.exe Token: SeRestorePrivilege 4872 powershell.exe Token: SeShutdownPrivilege 4872 powershell.exe Token: SeDebugPrivilege 4872 powershell.exe Token: SeSystemEnvironmentPrivilege 4872 powershell.exe Token: SeRemoteShutdownPrivilege 4872 powershell.exe Token: SeUndockPrivilege 4872 powershell.exe Token: SeManageVolumePrivilege 4872 powershell.exe Token: 33 4872 powershell.exe Token: 34 4872 powershell.exe Token: 35 4872 powershell.exe Token: 36 4872 powershell.exe Token: SeDebugPrivilege 3800 powershell.exe Token: SeIncreaseQuotaPrivilege 3800 powershell.exe Token: SeSecurityPrivilege 3800 powershell.exe Token: SeTakeOwnershipPrivilege 3800 powershell.exe Token: SeLoadDriverPrivilege 3800 powershell.exe Token: SeSystemProfilePrivilege 3800 powershell.exe Token: SeSystemtimePrivilege 3800 powershell.exe Token: SeProfSingleProcessPrivilege 3800 powershell.exe Token: SeIncBasePriorityPrivilege 3800 powershell.exe Token: SeCreatePagefilePrivilege 3800 powershell.exe Token: SeBackupPrivilege 3800 powershell.exe Token: SeRestorePrivilege 3800 powershell.exe Token: SeShutdownPrivilege 3800 powershell.exe Token: SeDebugPrivilege 3800 powershell.exe Token: SeSystemEnvironmentPrivilege 3800 powershell.exe Token: SeRemoteShutdownPrivilege 3800 powershell.exe Token: SeUndockPrivilege 3800 powershell.exe Token: SeManageVolumePrivilege 3800 powershell.exe Token: 33 3800 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4604 ExcellentFree.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1552 wrote to memory of 4604 1552 ExcellentDll.exe 84 PID 1552 wrote to memory of 4604 1552 ExcellentDll.exe 84 PID 1552 wrote to memory of 1700 1552 ExcellentDll.exe 85 PID 1552 wrote to memory of 1700 1552 ExcellentDll.exe 85 PID 4604 wrote to memory of 3424 4604 ExcellentFree.exe 92 PID 4604 wrote to memory of 3424 4604 ExcellentFree.exe 92 PID 4604 wrote to memory of 4872 4604 ExcellentFree.exe 95 PID 4604 wrote to memory of 4872 4604 ExcellentFree.exe 95 PID 4604 wrote to memory of 3800 4604 ExcellentFree.exe 97 PID 4604 wrote to memory of 3800 4604 ExcellentFree.exe 97 PID 4604 wrote to memory of 2212 4604 ExcellentFree.exe 100 PID 4604 wrote to memory of 2212 4604 ExcellentFree.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExcellentDll.exe"C:\Users\Admin\AppData\Local\Temp\ExcellentDll.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe"C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ExcellentFree.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
-
C:\Users\Admin\AppData\Local\Temp\ExLoader.exe"C:\Users\Admin\AppData\Local\Temp\ExLoader.exe"2⤵
- Executes dropped EXE
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5c67441dfa09f61bca500bb43407c56b8
SHA15a56cf7cbeb48c109e2128c31b681fac3959157b
SHA25663082da456c124d0bc516d2161d1613db5f3008d903e4066d2c7b4e90b435f33
SHA512325de8b718b3a01df05e20e028c5882240e5fd2e96c771361b776312923ff178f27494a1f5249bf6d7365a99155eb8735a51366e85597008e6a10462e63ee0e8
-
Filesize
1KB
MD5a3c1b2c7463ee67e173b0bacfb3e0203
SHA1eaaf0eb6e39337513be7d771fe1ed7249566dd00
SHA2567cf0c5a160dc8f1cf2277a6866d5006e5d65f092b227e2977ea48b05950fa7da
SHA512852eb10a004d84859d517f0af76cc4c6148a041903ed545f37e12150119364f80edb95e1be40f448d3b4273cb94716f38007419c014a835e2976901fac952123
-
Filesize
1KB
MD5ee837f9246bf7d67b3132d8c32031517
SHA1044171961c32e56e9e41da106ca654d1d7a5198f
SHA256bf2368988696a019042e21b490d30f66297c8517a9fd3ca798fac7183d2b2d28
SHA512cd8636c9fcdf8eb25cde91309edf5a01cba0b155d81f4a176c0bb7e0b829cc0b7adea724d6d27778beaf1247bafdddc9c47d05388c23da26a21e8c436d47d4a5
-
Filesize
374KB
MD54183f8ec375a90742d38b1d69d136f92
SHA1a630ecdb41aaa0982fad2775dd6114d20a5e0081
SHA256ec8c87c21a99ec03772008304fe1a8a3261aa0beecafa7066c456069b66a33c6
SHA5125c23e9cfdadb4de5d57130d6fead4b072ee3034554d8ba17b0d8935eac75f8986f9648ca225ea3c10757fe888cc049634872ee0278953906a735f5242d8ac060
-
Filesize
76KB
MD58cc568f48114422b0ca792dc8ce6009a
SHA1bbe67dabd894ac2e45dc8027c6e3000f73ec97d7
SHA2567a3d86182ae45a6be17ef36d1f12463b398c165a7e6fe4aa80e56ceab7f036eb
SHA51245fe66a17c0473c0a4967d501d6f28f7a41fdce03ec31c46fb11ffd5fd848493578effbc36b4247ae49b987c41c3a559a9185dfdd0fd42468f30c310bea7bcc4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82