Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 16:50
Behavioral task
behavioral1
Sample
CrackLauncherPass1234.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
CrackLauncherPass1234.exe
Resource
win10v2004-20250217-en
General
-
Target
CrackLauncherPass1234.exe
-
Size
73KB
-
MD5
fa0d41dc7ca9c40b5bd4ddc84ddcab86
-
SHA1
86e94ea9ecbcf30f187e68fb8c5afd6ee2891ba9
-
SHA256
35dc677cc4ded7c3ef15ed4130c13c23c62055f78161c2d93318113c2fd0de66
-
SHA512
6e4dbfd1edb207bb017da41864811d793f23bb032e0838b24cafaac41f51806333e67b6f69a18d12bc8ca08c6b533d56f9d287c464b445ead92e8bd49e7e5d13
-
SSDEEP
1536:UrNNEWzOq8we2zoBdJBrsTebq+AiNcgk6UfV4OiUhzQ6QBV7dAM:XWzOlgOfJZbqGKfV4OPhzQ6Qv7GM
Malware Config
Extracted
xworm
AbobusTsb-31029.portmap.host:31029
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/908-1-0x0000000000C40000-0x0000000000C58000-memory.dmp family_xworm behavioral1/files/0x000a0000000120fd-34.dat family_xworm behavioral1/memory/1388-36-0x0000000000AA0000-0x0000000000AB8000-memory.dmp family_xworm behavioral1/memory/1988-41-0x0000000000390000-0x00000000003A8000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2260 powershell.exe 2864 powershell.exe 2840 powershell.exe 2600 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk CrackLauncherPass1234.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk CrackLauncherPass1234.exe -
Executes dropped EXE 3 IoCs
pid Process 1388 svchost.exe 2984 svchost.exe 1988 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" CrackLauncherPass1234.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2008 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2260 powershell.exe 2864 powershell.exe 2840 powershell.exe 2600 powershell.exe 908 CrackLauncherPass1234.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 908 CrackLauncherPass1234.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 908 CrackLauncherPass1234.exe Token: SeDebugPrivilege 1388 svchost.exe Token: SeDebugPrivilege 2984 svchost.exe Token: SeDebugPrivilege 1988 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 908 CrackLauncherPass1234.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 908 wrote to memory of 2260 908 CrackLauncherPass1234.exe 29 PID 908 wrote to memory of 2260 908 CrackLauncherPass1234.exe 29 PID 908 wrote to memory of 2260 908 CrackLauncherPass1234.exe 29 PID 908 wrote to memory of 2864 908 CrackLauncherPass1234.exe 31 PID 908 wrote to memory of 2864 908 CrackLauncherPass1234.exe 31 PID 908 wrote to memory of 2864 908 CrackLauncherPass1234.exe 31 PID 908 wrote to memory of 2840 908 CrackLauncherPass1234.exe 33 PID 908 wrote to memory of 2840 908 CrackLauncherPass1234.exe 33 PID 908 wrote to memory of 2840 908 CrackLauncherPass1234.exe 33 PID 908 wrote to memory of 2600 908 CrackLauncherPass1234.exe 35 PID 908 wrote to memory of 2600 908 CrackLauncherPass1234.exe 35 PID 908 wrote to memory of 2600 908 CrackLauncherPass1234.exe 35 PID 908 wrote to memory of 2008 908 CrackLauncherPass1234.exe 37 PID 908 wrote to memory of 2008 908 CrackLauncherPass1234.exe 37 PID 908 wrote to memory of 2008 908 CrackLauncherPass1234.exe 37 PID 1316 wrote to memory of 1388 1316 taskeng.exe 40 PID 1316 wrote to memory of 1388 1316 taskeng.exe 40 PID 1316 wrote to memory of 1388 1316 taskeng.exe 40 PID 1316 wrote to memory of 2984 1316 taskeng.exe 41 PID 1316 wrote to memory of 2984 1316 taskeng.exe 41 PID 1316 wrote to memory of 2984 1316 taskeng.exe 41 PID 1316 wrote to memory of 1988 1316 taskeng.exe 42 PID 1316 wrote to memory of 1988 1316 taskeng.exe 42 PID 1316 wrote to memory of 1988 1316 taskeng.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CrackLauncherPass1234.exe"C:\Users\Admin\AppData\Local\Temp\CrackLauncherPass1234.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\CrackLauncherPass1234.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'CrackLauncherPass1234.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2008
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3634B9B2-1DCA-41D3-BB32-02C44C0BF7D0} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TOVTN3MZ7HFI7H2IUDO6.temp
Filesize7KB
MD5a3768b4d60d45ee79b7db6d71fed7c68
SHA140457e006e332f9f57c526e92fce366d605a7d7b
SHA256c46e5ddd59bd2dbebb17c83d604d5c8112eb0324960267239b606036864967ed
SHA5126e049177ae379b874fd5cc5d18718bb4ee41292add216793cac4ae7d040459afba2c8b5265d4f75248ff66a5a6a0b031e0e1add413d5ae02b02889403b341f43
-
Filesize
73KB
MD5fa0d41dc7ca9c40b5bd4ddc84ddcab86
SHA186e94ea9ecbcf30f187e68fb8c5afd6ee2891ba9
SHA25635dc677cc4ded7c3ef15ed4130c13c23c62055f78161c2d93318113c2fd0de66
SHA5126e4dbfd1edb207bb017da41864811d793f23bb032e0838b24cafaac41f51806333e67b6f69a18d12bc8ca08c6b533d56f9d287c464b445ead92e8bd49e7e5d13