Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
AlisInjectorx64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AlisInjectorx64.exe
Resource
win10v2004-20250217-en
General
-
Target
AlisInjectorx64.exe
-
Size
540KB
-
MD5
5d577543e14898862de2fc5f4976af91
-
SHA1
38569f433469a7b9d04acc52158523ce7b3e6cf3
-
SHA256
61493f2dac1330b7b853c4af5298dbcfbdef56f4cbd44c2266e0d23ba9d44483
-
SHA512
223a01dc8c67da3889140a6e77a3a4721c35ba4254c165675053627dc5a558b790fdda286a545b92424a5690b6e0e3df8eacca21da67dea44a490170adacc165
-
SSDEEP
12288:IepEAmsrIPR7Ifas9YFu7QHzs1vnVRLhjg0BX:I2S4taanVHB
Malware Config
Extracted
xworm
5.0
cR9KWMfVyMWGAarG
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/fSgk0zpE
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x0007000000012118-2.dat family_xworm behavioral1/memory/2456-13-0x0000000000110000-0x000000000013E000-memory.dmp family_xworm behavioral1/memory/2960-23-0x0000000000AE0000-0x0000000000B0E000-memory.dmp family_xworm behavioral1/memory/3064-26-0x0000000000350000-0x000000000037E000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk msedge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk msedge.exe -
Executes dropped EXE 5 IoCs
pid Process 2456 msedge.exe 2424 AlisInjector(x64).exe 1180 Process not Found 2960 XClient.exe 3064 XClient.exe -
Loads dropped DLL 2 IoCs
pid Process 1632 AlisInjectorx64.exe 1632 AlisInjectorx64.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 4 pastebin.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AlisInjectorx64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2456 msedge.exe Token: SeDebugPrivilege 804 powershell.exe Token: SeDebugPrivilege 2456 msedge.exe Token: SeDebugPrivilege 2960 XClient.exe Token: SeDebugPrivilege 3064 XClient.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1632 wrote to memory of 804 1632 AlisInjectorx64.exe 30 PID 1632 wrote to memory of 804 1632 AlisInjectorx64.exe 30 PID 1632 wrote to memory of 804 1632 AlisInjectorx64.exe 30 PID 1632 wrote to memory of 804 1632 AlisInjectorx64.exe 30 PID 1632 wrote to memory of 2456 1632 AlisInjectorx64.exe 32 PID 1632 wrote to memory of 2456 1632 AlisInjectorx64.exe 32 PID 1632 wrote to memory of 2456 1632 AlisInjectorx64.exe 32 PID 1632 wrote to memory of 2456 1632 AlisInjectorx64.exe 32 PID 1632 wrote to memory of 2424 1632 AlisInjectorx64.exe 33 PID 1632 wrote to memory of 2424 1632 AlisInjectorx64.exe 33 PID 1632 wrote to memory of 2424 1632 AlisInjectorx64.exe 33 PID 1632 wrote to memory of 2424 1632 AlisInjectorx64.exe 33 PID 2456 wrote to memory of 2736 2456 msedge.exe 34 PID 2456 wrote to memory of 2736 2456 msedge.exe 34 PID 2456 wrote to memory of 2736 2456 msedge.exe 34 PID 492 wrote to memory of 2960 492 taskeng.exe 38 PID 492 wrote to memory of 2960 492 taskeng.exe 38 PID 492 wrote to memory of 2960 492 taskeng.exe 38 PID 492 wrote to memory of 3064 492 taskeng.exe 39 PID 492 wrote to memory of 3064 492 taskeng.exe 39 PID 492 wrote to memory of 3064 492 taskeng.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\AlisInjectorx64.exe"C:\Users\Admin\AppData\Local\Temp\AlisInjectorx64.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAYwBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAagBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAbgBnACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2736
-
-
-
C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"C:\Users\Admin\AppData\Local\Temp\AlisInjector(x64).exe"2⤵
- Executes dropped EXE
PID:2424
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {63A9BA4F-B04D-4A31-884E-C90664C26936} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD5b632f8ffc4243c626a0c5100ac1f2efe
SHA1156143aa36efb7199c7857b042c5eccdeeeea0e2
SHA2567569a0e2198640cacd8936519ed7e7fd27eab4bc3db3a033c04bc95c213bf40a
SHA51269bf752a107f8062b56bcd553614d784b4f04f40758c68dd12e3552c1064954af6552692ddda796034d06082036847329bf3469ede8c33b8b19745ea8d039f18
-
Filesize
161KB
MD571c938b1700643db88bf57abf2df0efb
SHA12be0624b4a6d813daa0183d9df5dfeaa9f86a32b
SHA25653c8644bcdec5d0acc598497d86737bac723da0489e61a547dfd02eaea56b459
SHA51233c83e2606086a61e75293dd59173f9ffeee4a9806911223289dfdfd9470a568e4f7f743afc7553ed3e3140be0508908b5c54288ff3bf53fb9d0a16ac10d35db