Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 08:34
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20250217-en
General
-
Target
XClient.exe
-
Size
81KB
-
MD5
b802ae101004f45cfd32a900b94a86ca
-
SHA1
a719fb0b493c258c836e0fe7c305e01692d60240
-
SHA256
ff16df69039d6329aebb2adf7396ed766e253ab58a9aa096906a3c7e40d4793f
-
SHA512
fe0824d2a94f72899af3fd4016be14ba25d144b2bf0f4b6d6c59f21d06eefb8283699495b1d0ca79541b2777f42649cb6522e407b52b342892e61cb104b4e659
-
SSDEEP
1536:k0NvSBCg9qehAGGlaODmvk+bL6ruzaSq6EH0EOXTQEtKSLSTdS1EAd8IIR:k0N5g9bevI4ms+bL6uaSIHhODztX+gE7
Malware Config
Extracted
xworm
november-cope.gl.at.ply.gg:37025
-
Install_directory
%ProgramData%
-
install_file
update.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2080-1-0x0000000000F30000-0x0000000000F4A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2760 powershell.exe 2580 powershell.exe 2584 powershell.exe 1028 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\update.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\update.lnk XClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\update = "C:\\ProgramData\\update.exe" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2760 powershell.exe 2580 powershell.exe 2584 powershell.exe 1028 powershell.exe 2080 XClient.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2080 XClient.exe Token: SeDebugPrivilege 2760 powershell.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 1028 powershell.exe Token: SeDebugPrivilege 2080 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2080 XClient.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2760 2080 XClient.exe 30 PID 2080 wrote to memory of 2760 2080 XClient.exe 30 PID 2080 wrote to memory of 2760 2080 XClient.exe 30 PID 2080 wrote to memory of 2580 2080 XClient.exe 32 PID 2080 wrote to memory of 2580 2080 XClient.exe 32 PID 2080 wrote to memory of 2580 2080 XClient.exe 32 PID 2080 wrote to memory of 2584 2080 XClient.exe 34 PID 2080 wrote to memory of 2584 2080 XClient.exe 34 PID 2080 wrote to memory of 2584 2080 XClient.exe 34 PID 2080 wrote to memory of 1028 2080 XClient.exe 36 PID 2080 wrote to memory of 1028 2080 XClient.exe 36 PID 2080 wrote to memory of 1028 2080 XClient.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\update.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'update.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DJ4EK3VUCYNLUND25J0M.temp
Filesize7KB
MD53843bbf3037c3d6b1bcbb6425f444105
SHA1b0e49e622026463623d5cbb5d5a2ac6662f473b1
SHA256d5b21fb4a7d0b3b9d9d0d069385d2b99ddee6c1a0fdf7ea60c6faf3bdfa74ae3
SHA5126a1473e62b6e057c25aa58d188eedaf3c702ef6aecb3b6b5de79f4dba59e181e84d282454286c4904c494f50f622b4d11379eed7a92d89469d36d19937103672