Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 15:51
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20241010-en
General
-
Target
XClient.exe
-
Size
36KB
-
MD5
c4e5b29e6d3ac61b6a5b36b8d208bbbb
-
SHA1
15f2cb1aa5b4413752d70e7305828f9461af0ca6
-
SHA256
ec46b8a0e372f8062ff4f3cc8a6817543aa2781e5a6d74bf914b3b43b4f087e3
-
SHA512
9a3ed168295db01ce5f98f59f8478d88d71744213191c4e221d761a3a79e9a281523d3b360b5bd305d7606bc4aebb80f337b18f21982f66de63a13664078c598
-
SSDEEP
768:reVXtHcDQZS9LR50UZmx/F89Rj6OOMhdQJT:r8dH+t51OF89Rj6OOMnS
Malware Config
Extracted
xworm
5.0
database-victoria.gl.at.ply.gg:7777
jGCQbD88dCyoEfYL
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2708-1-0x00000000011C0000-0x00000000011D0000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2452 powershell.exe 468 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2452 powershell.exe 468 powershell.exe 2708 XClient.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2708 XClient.exe Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 468 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2708 XClient.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2452 2708 XClient.exe 30 PID 2708 wrote to memory of 2452 2708 XClient.exe 30 PID 2708 wrote to memory of 2452 2708 XClient.exe 30 PID 2708 wrote to memory of 468 2708 XClient.exe 32 PID 2708 wrote to memory of 468 2708 XClient.exe 32 PID 2708 wrote to memory of 468 2708 XClient.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD55ad9be02afe06444bb71dc2c5989b930
SHA178d67fec05d5d66f219f0522e23277ade66908df
SHA25627b5ed842398b4c27d2a160edb69d64be9a44abc18fdf227a13321ae29077f1c
SHA51244569cd29e0e5f5244889bd33b980d94db6acb934e704ab81238593279c99a8a846149039bef77fd40d9aa0aebdddb461340e6abd82d9fd2ee9dfd531bc368eb