Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper_v2.3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bootstrapper_v2.3.exe
Resource
win10v2004-20250217-en
General
-
Target
Bootstrapper_v2.3.exe
-
Size
3.0MB
-
MD5
7744ab1b77f1c5204aacbcc67f80f5bc
-
SHA1
a1af80b9ca1310167c4f8e772c3959fdf4167f32
-
SHA256
3d418b43b753aa207aa32e87d3aac20cb5cb1498852a3d2c310196c7d668fb80
-
SHA512
6760ad3682c7a5eae25c7ec934a0131b13e02f621d4ed4580300aab4659a4601afbcdfe1ada11155a8085be6b0759c38aa810587559a074d4d61ec281566771c
-
SSDEEP
49152:VmjfxLrv43xqsknxiEgcbMSYKlUgmFLH7G7g569awPsD9sOBfXVfRQ8kQ79u:Vedrg3xTkx3rUNG7a69vPsS6/VfRbksU
Malware Config
Extracted
xworm
75.80.209.66:8080
-
Install_directory
%Userprofile%
-
install_file
RealtekAudioDG.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000012102-5.dat family_xworm behavioral1/memory/2348-7-0x0000000001160000-0x000000000117A000-memory.dmp family_xworm behavioral1/memory/1588-64-0x0000000001090000-0x00000000010AA000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2644 powershell.exe 1180 powershell.exe 2708 powershell.exe 2596 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RealtekAudioDG.lnk Bootstrapper_v2.2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RealtekAudioDG.lnk Bootstrapper_v2.2.exe -
Executes dropped EXE 5 IoCs
pid Process 2348 Bootstrapper_v2.2.exe 1864 BootstrapperNew (1).exe 1212 Process not Found 1588 RealtekAudioDG.exe 1544 RealtekAudioDG.exe -
Loads dropped DLL 1 IoCs
pid Process 2512 Bootstrapper_v2.3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\RealtekAudioDG = "C:\\Users\\Admin\\RealtekAudioDG.exe" Bootstrapper_v2.2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2708 powershell.exe 2596 powershell.exe 2644 powershell.exe 1180 powershell.exe 2348 Bootstrapper_v2.2.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2348 Bootstrapper_v2.2.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 1180 powershell.exe Token: SeDebugPrivilege 2348 Bootstrapper_v2.2.exe Token: SeDebugPrivilege 1588 RealtekAudioDG.exe Token: SeDebugPrivilege 1544 RealtekAudioDG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2348 Bootstrapper_v2.2.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2348 2512 Bootstrapper_v2.3.exe 30 PID 2512 wrote to memory of 2348 2512 Bootstrapper_v2.3.exe 30 PID 2512 wrote to memory of 2348 2512 Bootstrapper_v2.3.exe 30 PID 2512 wrote to memory of 1864 2512 Bootstrapper_v2.3.exe 31 PID 2512 wrote to memory of 1864 2512 Bootstrapper_v2.3.exe 31 PID 2512 wrote to memory of 1864 2512 Bootstrapper_v2.3.exe 31 PID 2348 wrote to memory of 2708 2348 Bootstrapper_v2.2.exe 32 PID 2348 wrote to memory of 2708 2348 Bootstrapper_v2.2.exe 32 PID 2348 wrote to memory of 2708 2348 Bootstrapper_v2.2.exe 32 PID 2348 wrote to memory of 2596 2348 Bootstrapper_v2.2.exe 34 PID 2348 wrote to memory of 2596 2348 Bootstrapper_v2.2.exe 34 PID 2348 wrote to memory of 2596 2348 Bootstrapper_v2.2.exe 34 PID 2348 wrote to memory of 2644 2348 Bootstrapper_v2.2.exe 36 PID 2348 wrote to memory of 2644 2348 Bootstrapper_v2.2.exe 36 PID 2348 wrote to memory of 2644 2348 Bootstrapper_v2.2.exe 36 PID 2348 wrote to memory of 1180 2348 Bootstrapper_v2.2.exe 38 PID 2348 wrote to memory of 1180 2348 Bootstrapper_v2.2.exe 38 PID 2348 wrote to memory of 1180 2348 Bootstrapper_v2.2.exe 38 PID 2348 wrote to memory of 2000 2348 Bootstrapper_v2.2.exe 40 PID 2348 wrote to memory of 2000 2348 Bootstrapper_v2.2.exe 40 PID 2348 wrote to memory of 2000 2348 Bootstrapper_v2.2.exe 40 PID 2608 wrote to memory of 1588 2608 taskeng.exe 45 PID 2608 wrote to memory of 1588 2608 taskeng.exe 45 PID 2608 wrote to memory of 1588 2608 taskeng.exe 45 PID 2608 wrote to memory of 1544 2608 taskeng.exe 46 PID 2608 wrote to memory of 1544 2608 taskeng.exe 46 PID 2608 wrote to memory of 1544 2608 taskeng.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper_v2.3.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper_v2.3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\Bootstrapper_v2.2.exe"C:\Users\Admin\Bootstrapper_v2.2.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Bootstrapper_v2.2.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Bootstrapper_v2.2.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\RealtekAudioDG.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RealtekAudioDG.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RealtekAudioDG" /tr "C:\Users\Admin\RealtekAudioDG.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2000
-
-
-
C:\Users\Admin\BootstrapperNew (1).exe"C:\Users\Admin\BootstrapperNew (1).exe"2⤵
- Executes dropped EXE
PID:1864
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {10E3A92E-22C9-439B-ADE2-AB31FC433091} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\RealtekAudioDG.exeC:\Users\Admin\RealtekAudioDG.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Users\Admin\RealtekAudioDG.exeC:\Users\Admin\RealtekAudioDG.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5d194bf050c457b2dc6b80cc007295550
SHA1672302a7283cf21e443daa55632f3483c33ce6cb
SHA25683a2f2c48f78b0dd33f81df81289509739908eaf0eff45655ed7e33457ac5fb7
SHA512146b039b25961923ac6070dd7555f9de5c10fadd27412a46b9b72c21688aad6aca7db4616261ee094b7af9736632f7479c3925d8554430c3d400c5c86acf73a9
-
Filesize
78KB
MD5e237ba50d7c4c0d84f956a5168a78b49
SHA1d61a3b653ba7b93e93b7e390e4dd1dda487b1e0d
SHA2568b9f724111d915222ae03f66af3a00bcc4273dbe3474bd702bf34a067c256956
SHA512ddd7f4c4f02a277c3227d575c09d66f2056ccbee50fd9ccd9901cf221638909ab865244c8e0f41e8ad3c2d33ece03da06f7472b4148186b7b563661cae60f759
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e