Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
ExcellentDll.exe
Resource
win7-20240903-en
General
-
Target
ExcellentDll.exe
-
Size
345KB
-
MD5
69f478046e3ef37a710a452f796c9ef9
-
SHA1
f577229b18661c30938b8dd158019370be32c1d1
-
SHA256
29774f3e9e2de12c7441f765f340cd661c38de279922961fc69488e2feffe67c
-
SHA512
ee8994cd121e7437d9affc77988852a71895d92aea268517adeb8bf62fc7b532ea507a03ddc05f9a449e5729201d908690f3a9ac5350832d5c7c01328257eea8
-
SSDEEP
6144:Q0mluu8NPetOlmfMYdTQJzLtxfg6vgR6TNX5vcQY2MRcViNpqbCtULop+mG:Cou80CKQBxfPvgR6TVcLsiNpqmwok5
Malware Config
Extracted
xworm
cameras-happen.gl.at.ply.gg:23386
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000a0000000120d6-3.dat family_xworm behavioral1/memory/2760-14-0x0000000001110000-0x000000000112A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2656 powershell.exe 2676 powershell.exe 1512 powershell.exe 2140 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ExcellentFree.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ExcellentFree.exe -
Executes dropped EXE 2 IoCs
pid Process 2760 ExcellentFree.exe 2756 ExLoader.exe -
Loads dropped DLL 2 IoCs
pid Process 2128 ExcellentDll.exe 2128 ExcellentDll.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" ExcellentFree.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExcellentDll.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2656 powershell.exe 2676 powershell.exe 1512 powershell.exe 2140 powershell.exe 2760 ExcellentFree.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2760 ExcellentFree.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 2140 powershell.exe Token: SeDebugPrivilege 2760 ExcellentFree.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2760 ExcellentFree.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2760 2128 ExcellentDll.exe 30 PID 2128 wrote to memory of 2760 2128 ExcellentDll.exe 30 PID 2128 wrote to memory of 2760 2128 ExcellentDll.exe 30 PID 2128 wrote to memory of 2760 2128 ExcellentDll.exe 30 PID 2128 wrote to memory of 2756 2128 ExcellentDll.exe 31 PID 2128 wrote to memory of 2756 2128 ExcellentDll.exe 31 PID 2128 wrote to memory of 2756 2128 ExcellentDll.exe 31 PID 2128 wrote to memory of 2756 2128 ExcellentDll.exe 31 PID 2760 wrote to memory of 2656 2760 ExcellentFree.exe 32 PID 2760 wrote to memory of 2656 2760 ExcellentFree.exe 32 PID 2760 wrote to memory of 2656 2760 ExcellentFree.exe 32 PID 2760 wrote to memory of 2676 2760 ExcellentFree.exe 34 PID 2760 wrote to memory of 2676 2760 ExcellentFree.exe 34 PID 2760 wrote to memory of 2676 2760 ExcellentFree.exe 34 PID 2760 wrote to memory of 1512 2760 ExcellentFree.exe 36 PID 2760 wrote to memory of 1512 2760 ExcellentFree.exe 36 PID 2760 wrote to memory of 1512 2760 ExcellentFree.exe 36 PID 2760 wrote to memory of 2140 2760 ExcellentFree.exe 38 PID 2760 wrote to memory of 2140 2760 ExcellentFree.exe 38 PID 2760 wrote to memory of 2140 2760 ExcellentFree.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExcellentDll.exe"C:\Users\Admin\AppData\Local\Temp\ExcellentDll.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe"C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ExcellentFree.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ExcellentFree.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
-
C:\Users\Admin\AppData\Local\Temp\ExLoader.exe"C:\Users\Admin\AppData\Local\Temp\ExLoader.exe"2⤵
- Executes dropped EXE
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b8af2986061ee932a56d9e62cae22016
SHA1846e00926cbcac8aa836e7b39729f51512f9c811
SHA25688443bb04a8cd1c5a06e33db752a1d4a81d870a59f3417225bc5cecf8f6b75f1
SHA512c88a0b81da928d8d07924b8262c83c154470eead8d7def550d164c2fd6a6a53b0a8291ef5575fdc671066a7160975a4ca8a70fcb01b4e066d0190d41c1d152f2
-
Filesize
374KB
MD54183f8ec375a90742d38b1d69d136f92
SHA1a630ecdb41aaa0982fad2775dd6114d20a5e0081
SHA256ec8c87c21a99ec03772008304fe1a8a3261aa0beecafa7066c456069b66a33c6
SHA5125c23e9cfdadb4de5d57130d6fead4b072ee3034554d8ba17b0d8935eac75f8986f9648ca225ea3c10757fe888cc049634872ee0278953906a735f5242d8ac060
-
Filesize
76KB
MD58cc568f48114422b0ca792dc8ce6009a
SHA1bbe67dabd894ac2e45dc8027c6e3000f73ec97d7
SHA2567a3d86182ae45a6be17ef36d1f12463b398c165a7e6fe4aa80e56ceab7f036eb
SHA51245fe66a17c0473c0a4967d501d6f28f7a41fdce03ec31c46fb11ffd5fd848493578effbc36b4247ae49b987c41c3a559a9185dfdd0fd42468f30c310bea7bcc4