Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 08:19
Behavioral task
behavioral1
Sample
petape.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
petape.exe
Resource
win10v2004-20250217-en
General
-
Target
petape.exe
-
Size
72KB
-
MD5
ec69a55b3fc572208e55c194442db2bc
-
SHA1
6cb591b3c96303a95bd42a60456010c60b0400e3
-
SHA256
20716ebe59c41a9cd923805dde46298fe40827a10be7652b1de258e556a87833
-
SHA512
e2991444484de2357ba5d0cd5f8c633cc0cf3469976c4f82f1b756cc97e51608c90f47d036b41f5e224636de801d91cdf1bfd07419c41aa69dd0d708b45eb154
-
SSDEEP
1536:Emh3s0epZ3yRnIe+bWMkJpgw+bv6rsOK8fQnrS4SSdS1EAd8IIF:EVnyRn3+b9igw0CsOPQnz5gEA6IIF
Malware Config
Extracted
xworm
la-judgment.gl.at.ply.gg:62627
-
Install_directory
%ProgramData%
-
install_file
update.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3044-1-0x0000000000940000-0x0000000000958000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2340 powershell.exe 380 powershell.exe 2844 powershell.exe 2876 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\update.lnk petape.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\update.lnk petape.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\update = "C:\\ProgramData\\update.exe" petape.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2340 powershell.exe 380 powershell.exe 2844 powershell.exe 2876 powershell.exe 3044 petape.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3044 petape.exe Token: SeDebugPrivilege 2340 powershell.exe Token: SeDebugPrivilege 380 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 3044 petape.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3044 petape.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2340 3044 petape.exe 31 PID 3044 wrote to memory of 2340 3044 petape.exe 31 PID 3044 wrote to memory of 2340 3044 petape.exe 31 PID 3044 wrote to memory of 380 3044 petape.exe 33 PID 3044 wrote to memory of 380 3044 petape.exe 33 PID 3044 wrote to memory of 380 3044 petape.exe 33 PID 3044 wrote to memory of 2844 3044 petape.exe 35 PID 3044 wrote to memory of 2844 3044 petape.exe 35 PID 3044 wrote to memory of 2844 3044 petape.exe 35 PID 3044 wrote to memory of 2876 3044 petape.exe 37 PID 3044 wrote to memory of 2876 3044 petape.exe 37 PID 3044 wrote to memory of 2876 3044 petape.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\petape.exe"C:\Users\Admin\AppData\Local\Temp\petape.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\petape.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'petape.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\update.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'update.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ac89d3a48c4754c793204f6418e35290
SHA15515ed700eb96d6f2dab03c9a36f455f06eb389d
SHA25682a931d1f999eda3cdfd4b981e9635660895babcae56274d716f4f4ee393f439
SHA512a890306b5e53f0b2b71ed0810724d68c3634a1462afdd4ba24d852e73a0b57246e2edb6965687593282963e5f637319f8667159aa225d489095f18c60dd69135