Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
82s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 18:35
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20250217-en
General
-
Target
XClient.exe
-
Size
207KB
-
MD5
6871607d92969776391efd493707eedc
-
SHA1
4a081720e336df47324b3a6e214e0be28754c07a
-
SHA256
90315fd137f2160e8d11223200c03bc2488f906007a5511240b29e1773596827
-
SHA512
74e437d5c95fc8019e954b93d71f6f0fe9bd8dc843153c791336bdee6ab25ed1fd3d75efa90645a60fa44c9cb43bf3dac20358d29fdbcadf157ccb559d8a2b12
-
SSDEEP
1536:Ks12gfnC6iy/PuF99N0z6POCZ0wLU7uS+ENi9:nfJ2F99N06OC1LUXk9
Malware Config
Extracted
xworm
5.0
thetest.selfhost.co:1339
6fb9p9QDJ0BS5PDw
-
Install_directory
%ProgramData%
-
install_file
DirectOutputService.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/4480-1-0x00000000007E0000-0x0000000000818000-memory.dmp family_xworm behavioral2/files/0x000500000001e725-56.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2240 powershell.exe 220 powershell.exe 2376 powershell.exe 4704 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation XClient.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender.lnk XClient.exe -
Executes dropped EXE 1 IoCs
pid Process 2012 Windows Defender -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\ProgramData\\Windows Defender" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3060 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4840 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4480 XClient.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 220 powershell.exe 220 powershell.exe 2376 powershell.exe 2376 powershell.exe 4704 powershell.exe 4704 powershell.exe 2240 powershell.exe 2240 powershell.exe 4480 XClient.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4480 XClient.exe Token: SeDebugPrivilege 220 powershell.exe Token: SeDebugPrivilege 2376 powershell.exe Token: SeDebugPrivilege 4704 powershell.exe Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 4480 XClient.exe Token: SeDebugPrivilege 2012 Windows Defender -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4480 XClient.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4480 wrote to memory of 220 4480 XClient.exe 91 PID 4480 wrote to memory of 220 4480 XClient.exe 91 PID 4480 wrote to memory of 2376 4480 XClient.exe 95 PID 4480 wrote to memory of 2376 4480 XClient.exe 95 PID 4480 wrote to memory of 4704 4480 XClient.exe 97 PID 4480 wrote to memory of 4704 4480 XClient.exe 97 PID 4480 wrote to memory of 2240 4480 XClient.exe 99 PID 4480 wrote to memory of 2240 4480 XClient.exe 99 PID 4480 wrote to memory of 4840 4480 XClient.exe 102 PID 4480 wrote to memory of 4840 4480 XClient.exe 102 PID 4480 wrote to memory of 5080 4480 XClient.exe 119 PID 4480 wrote to memory of 5080 4480 XClient.exe 119 PID 4480 wrote to memory of 4356 4480 XClient.exe 120 PID 4480 wrote to memory of 4356 4480 XClient.exe 120 PID 4356 wrote to memory of 3060 4356 cmd.exe 123 PID 4356 wrote to memory of 3060 4356 cmd.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Windows Defender'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Defender'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender" /tr "C:\ProgramData\Windows Defender"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4840
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "Windows Defender"2⤵PID:5080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpCBF6.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3060
-
-
-
C:\ProgramData\Windows Defender"C:\ProgramData\Windows Defender"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2012
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD56871607d92969776391efd493707eedc
SHA14a081720e336df47324b3a6e214e0be28754c07a
SHA25690315fd137f2160e8d11223200c03bc2488f906007a5511240b29e1773596827
SHA51274e437d5c95fc8019e954b93d71f6f0fe9bd8dc843153c791336bdee6ab25ed1fd3d75efa90645a60fa44c9cb43bf3dac20358d29fdbcadf157ccb559d8a2b12
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d6f3ebd2b805d2f9e26bd69cc815565e
SHA121b63de042a4de9f123972f34d517462245f0481
SHA2566ebb2a11cf144b31918622ac4afa79fad35b1f0b1dacb02dc15a4bc82bf89c49
SHA5123c2c65cdb9a289dd64e445ccea33cb90f3b3c1e5b4d491009aed54991a5ae8acc072b30472ad0ecefea84ed2d72b72a74672ff10d77b8a562f0e0b194e9095e5
-
Filesize
944B
MD5eb1ad317bd25b55b2bbdce8a28a74a94
SHA198a3978be4d10d62e7411946474579ee5bdc5ea6
SHA2569e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98
SHA512d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0
-
Filesize
944B
MD55cfe303e798d1cc6c1dab341e7265c15
SHA1cd2834e05191a24e28a100f3f8114d5a7708dc7c
SHA256c4d16552769ca1762f6867bce85589c645ac3dc490b650083d74f853f898cfab
SHA512ef151bbe0033a2caf2d40aff74855a3f42c8171e05a11c8ce93c7039d9430482c43fe93d9164ee94839aff253cad774dbf619dde9a8af38773ca66d59ac3400e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
159B
MD5e38da856d50d78a768d1ef84be0ab8da
SHA1a8d5b828693bbfeb81090649cd6247846a7784cb
SHA256296f500baff99c4543a11b0d9d0e5344e899576d3551bd6821e433d5792e0e2f
SHA512ff60e65a84cb606b15091eee12bd6d9ffea8f0db94a1851388e74b728975e3e4b64b4828fae450296a04a54bd5e99e6cc0dc5f224bcd0c4d53a79f9553b14a40