Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    332s
  • max time network
    334s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01/03/2025, 18:46

Errors

Reason
Machine shutdown

General

  • Target

    Bloxstrap (1).exe

  • Size

    4.3MB

  • MD5

    56d66e4df02b04ed21a45cc29e583679

  • SHA1

    0537dc87acb3ce7b7a9b539e18e74a495f71673c

  • SHA256

    d7694169a73999cbd1d8ea033b6a164321082b582eacbbbe6d3f607b563a3599

  • SHA512

    b0040d61eccbe9c9cb34863379ffafec534b36357e1d5b56fa14ad9418ff1cf919f1d0f95b5b886942c16810775386ed76323d29aecd116e0b276b73e0576a98

  • SSDEEP

    98304:3iLGdqIgOoD9sXV4GiXTSQdg3thqK2Oz1q70/xDTISpspijCk:XYrHGiXLdg9jz1xjplCk

Malware Config

Extracted

Family

xworm

C2

cause-indexes.gl.at.ply.gg:17210

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 18 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bloxstrap (1).exe
    "C:\Users\Admin\AppData\Local\Temp\Bloxstrap (1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe
      "C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe"
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-67acd0f240534e7b\RobloxPlayerBeta.exe
        "C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-67acd0f240534e7b\RobloxPlayerBeta.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of UnmapMainImage
        PID:6568
    • C:\Users\Admin\AppData\Local\Temp\XClient.exe
      "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1764
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3812
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1704
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3548
      • C:\Users\Admin\AppData\Local\Temp\dajvys.exe
        "C:\Users\Admin\AppData\Local\Temp\dajvys.exe"
        3⤵
        • UAC bypass
        • Event Triggered Execution: Image File Execution Options Injection
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Writes to the Master Boot Record (MBR)
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2364
  • C:\Users\Admin\AppData\Local\Temp\dajvys.exe
    C:\Users\Admin\AppData\Local\Temp\dajvys.exe explorer.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3924
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa3a13055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:8012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-67acd0f240534e7b\RobloxPlayerBeta.dll

    Filesize

    14.5MB

    MD5

    5547db0332d5ea03f99a6d86a242c8c8

    SHA1

    eb539ffdeb898d3732873110b0411498750f68d8

    SHA256

    ae71840949603aca6719a460135d139aed345c5cfe0c9e45675de447b25312a6

    SHA512

    49b22fd8e9dd1340e31c8f6d67f437ddbe1800c4db46200a0285c73bd1a65dd6deb5ae1aa66fe494651094c99f1c4656ed8f3762f4bbcf34cc35096ac3cde402

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    627073ee3ca9676911bee35548eff2b8

    SHA1

    4c4b68c65e2cab9864b51167d710aa29ebdcff2e

    SHA256

    85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

    SHA512

    3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    1a9fa92a4f2e2ec9e244d43a6a4f8fb9

    SHA1

    9910190edfaccece1dfcc1d92e357772f5dae8f7

    SHA256

    0ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888

    SHA512

    5d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    051a74485331f9d9f5014e58ec71566c

    SHA1

    4ed0256a84f2e95609a0b4d5c249bca624db8fe4

    SHA256

    3f67e4ba795fd89d33e9a1fe7547e297a82ae50b8f25eedc2b33a27866b28888

    SHA512

    1f15fd8ca727b198495ef826002c1cbcc63e98eecb2e92abff48354ae668e6c3aaf9bd3005664967ae75637bacee7e730ce36142483d08ae6a068d9ae3e0e17d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    6f0e62045515b66d0a0105abc22dbf19

    SHA1

    894d685122f3f3c9a3457df2f0b12b0e851b394c

    SHA256

    529811e4d3496c559f3bd92cd877b93b719c3ac4834202aa76ab9e16e25f9319

    SHA512

    f78426df6032ee77f8c463446ab1c6bb4669ef7a2463dead831ec4ff83a07d7dc702d79372d8bcaf4594bf0fb6e11e9f027f3e0325de9b19be5f51b7b80ed54a

  • C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe

    Filesize

    10.8MB

    MD5

    05fe4ab617fb8a0e6df903e14b3312c9

    SHA1

    04500479b9e6cdfbaf431634cfbfd496214c80ca

    SHA256

    b4e27af0caf72026adc98fa65d34d5fe22882b2c3b36291f39fb2c69b3183efc

    SHA512

    acff0e95ba628ed724ad331b1e5701f5cef343cb8ee5aa44aff0c5907453abaca68b874c7275a61d835d982ac18e0a1ffafa9289c7e72b9cc8b79c564b46c3da

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe

    Filesize

    77KB

    MD5

    1fdd77cb12693ba80efbe8a5463b34b0

    SHA1

    a28daa287556525ef8d54f4244fac761b9be9dc3

    SHA256

    03075f33cfb3ba600a7312a2c6ed5a26dd2e2d210913f70a471f1a120e501891

    SHA512

    e635f719d5e4a3a394ef348e5324c4e407427f00354e0ba9bc7cd25a3e966ecbd045211141a2c3156d1caf4459fd813b772595e74df06426bc9fd884e7e0f7d1

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_osik2atb.o12.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\dajvys.exe

    Filesize

    1.7MB

    MD5

    6e628c5531010f1053fff090a7699659

    SHA1

    237e5b8870092dd0e9a3b0fb76da93fcfce56516

    SHA256

    52d65a486dd027d9d6e3ca10ea808815ff0fda4e5032695333b7c2d5a5f95e41

    SHA512

    53eb023d70038b2820a6c0ed0a453307f90b22279e521fa8af3b6ef240ce022300a1d05794bf02d52f472c5adeb87c814373c5e29b3f13102c0128af06d5f0e7

  • memory/1764-30-0x0000011AB2630000-0x0000011AB2652000-memory.dmp

    Filesize

    136KB

  • memory/2320-28-0x0000000000530000-0x000000000054A000-memory.dmp

    Filesize

    104KB

  • memory/2320-76-0x00007FF9F4830000-0x00007FF9F52F2000-memory.dmp

    Filesize

    10.8MB

  • memory/2320-85-0x000000001B2C0000-0x000000001B2CC000-memory.dmp

    Filesize

    48KB

  • memory/2320-26-0x00007FF9F4830000-0x00007FF9F52F2000-memory.dmp

    Filesize

    10.8MB

  • memory/2320-3822-0x00007FF9F4830000-0x00007FF9F52F2000-memory.dmp

    Filesize

    10.8MB

  • memory/2364-3821-0x0000000000400000-0x00000000006D8000-memory.dmp

    Filesize

    2.8MB

  • memory/2364-3802-0x0000000000400000-0x00000000006D8000-memory.dmp

    Filesize

    2.8MB

  • memory/3368-27-0x00007FF9F178B000-0x00007FF9F178C000-memory.dmp

    Filesize

    4KB

  • memory/3368-77-0x00007FF9F178B000-0x00007FF9F178C000-memory.dmp

    Filesize

    4KB

  • memory/3380-1-0x0000000000100000-0x000000000054A000-memory.dmp

    Filesize

    4.3MB

  • memory/3380-29-0x00007FF9F4830000-0x00007FF9F52F2000-memory.dmp

    Filesize

    10.8MB

  • memory/3380-2-0x00007FF9F4830000-0x00007FF9F52F2000-memory.dmp

    Filesize

    10.8MB

  • memory/3380-0-0x00007FF9F4833000-0x00007FF9F4835000-memory.dmp

    Filesize

    8KB

  • memory/3924-3807-0x0000000000400000-0x00000000006D8000-memory.dmp

    Filesize

    2.8MB

  • memory/6568-3748-0x00007FFA145A0000-0x00007FFA145A9000-memory.dmp

    Filesize

    36KB

  • memory/6568-3736-0x00007FFA14380000-0x00007FFA14390000-memory.dmp

    Filesize

    64KB

  • memory/6568-3749-0x00007FFA145A0000-0x00007FFA145A9000-memory.dmp

    Filesize

    36KB

  • memory/6568-3766-0x00007FFA131F0000-0x00007FFA13217000-memory.dmp

    Filesize

    156KB

  • memory/6568-3765-0x00007FFA131F0000-0x00007FFA13217000-memory.dmp

    Filesize

    156KB

  • memory/6568-3764-0x00007FFA131F0000-0x00007FFA13217000-memory.dmp

    Filesize

    156KB

  • memory/6568-3763-0x00007FFA131F0000-0x00007FFA13217000-memory.dmp

    Filesize

    156KB

  • memory/6568-3762-0x00007FFA131F0000-0x00007FFA13217000-memory.dmp

    Filesize

    156KB

  • memory/6568-3761-0x00007FFA131F0000-0x00007FFA13217000-memory.dmp

    Filesize

    156KB

  • memory/6568-3760-0x00007FFA131B0000-0x00007FFA131C0000-memory.dmp

    Filesize

    64KB

  • memory/6568-3759-0x00007FFA131B0000-0x00007FFA131C0000-memory.dmp

    Filesize

    64KB

  • memory/6568-3758-0x00007FFA13180000-0x00007FFA131A0000-memory.dmp

    Filesize

    128KB

  • memory/6568-3757-0x00007FFA13180000-0x00007FFA131A0000-memory.dmp

    Filesize

    128KB

  • memory/6568-3756-0x00007FFA13180000-0x00007FFA131A0000-memory.dmp

    Filesize

    128KB

  • memory/6568-3755-0x00007FFA13180000-0x00007FFA131A0000-memory.dmp

    Filesize

    128KB

  • memory/6568-3754-0x00007FFA13180000-0x00007FFA131A0000-memory.dmp

    Filesize

    128KB

  • memory/6568-3753-0x00007FFA13150000-0x00007FFA13160000-memory.dmp

    Filesize

    64KB

  • memory/6568-3752-0x00007FFA13150000-0x00007FFA13160000-memory.dmp

    Filesize

    64KB

  • memory/6568-3751-0x00007FFA13040000-0x00007FFA13050000-memory.dmp

    Filesize

    64KB

  • memory/6568-3750-0x00007FFA13040000-0x00007FFA13050000-memory.dmp

    Filesize

    64KB

  • memory/6568-3730-0x00007FFA12F80000-0x00007FFA12F90000-memory.dmp

    Filesize

    64KB

  • memory/6568-3747-0x00007FFA145A0000-0x00007FFA145A9000-memory.dmp

    Filesize

    36KB

  • memory/6568-3746-0x00007FFA145A0000-0x00007FFA145A9000-memory.dmp

    Filesize

    36KB

  • memory/6568-3745-0x00007FFA145A0000-0x00007FFA145A9000-memory.dmp

    Filesize

    36KB

  • memory/6568-3744-0x00007FFA14580000-0x00007FFA14590000-memory.dmp

    Filesize

    64KB

  • memory/6568-3743-0x00007FFA14580000-0x00007FFA14590000-memory.dmp

    Filesize

    64KB

  • memory/6568-3742-0x00007FFA14580000-0x00007FFA14590000-memory.dmp

    Filesize

    64KB

  • memory/6568-3740-0x00007FFA143C0000-0x00007FFA143CD000-memory.dmp

    Filesize

    52KB

  • memory/6568-3739-0x00007FFA143C0000-0x00007FFA143CD000-memory.dmp

    Filesize

    52KB

  • memory/6568-3738-0x00007FFA143C0000-0x00007FFA143CD000-memory.dmp

    Filesize

    52KB

  • memory/6568-3737-0x00007FFA143C0000-0x00007FFA143CD000-memory.dmp

    Filesize

    52KB

  • memory/6568-3741-0x00007FFA143C0000-0x00007FFA143CD000-memory.dmp

    Filesize

    52KB

  • memory/6568-3735-0x00007FFA14380000-0x00007FFA14390000-memory.dmp

    Filesize

    64KB

  • memory/6568-3734-0x00007FFA14310000-0x00007FFA14320000-memory.dmp

    Filesize

    64KB

  • memory/6568-3733-0x00007FFA14310000-0x00007FFA14320000-memory.dmp

    Filesize

    64KB

  • memory/6568-3732-0x00007FFA12F80000-0x00007FFA12F90000-memory.dmp

    Filesize

    64KB

  • memory/6568-3731-0x00007FFA12F80000-0x00007FFA12F90000-memory.dmp

    Filesize

    64KB

  • memory/6568-3729-0x00007FFA12F60000-0x00007FFA12F70000-memory.dmp

    Filesize

    64KB

  • memory/6568-3713-0x00007FFA143D0000-0x00007FFA143E0000-memory.dmp

    Filesize

    64KB

  • memory/6568-3728-0x00007FFA12F60000-0x00007FFA12F70000-memory.dmp

    Filesize

    64KB

  • memory/6568-3727-0x00007FFA12F60000-0x00007FFA12F70000-memory.dmp

    Filesize

    64KB

  • memory/6568-3726-0x00007FFA12DB0000-0x00007FFA12DC0000-memory.dmp

    Filesize

    64KB

  • memory/6568-3725-0x00007FFA12DB0000-0x00007FFA12DC0000-memory.dmp

    Filesize

    64KB

  • memory/6568-3724-0x00007FFA12C40000-0x00007FFA12C50000-memory.dmp

    Filesize

    64KB

  • memory/6568-3723-0x00007FFA12C40000-0x00007FFA12C50000-memory.dmp

    Filesize

    64KB

  • memory/6568-3721-0x00007FFA14480000-0x00007FFA144A0000-memory.dmp

    Filesize

    128KB

  • memory/6568-3720-0x00007FFA14480000-0x00007FFA144A0000-memory.dmp

    Filesize

    128KB

  • memory/6568-3719-0x00007FFA14480000-0x00007FFA144A0000-memory.dmp

    Filesize

    128KB

  • memory/6568-3718-0x00007FFA14480000-0x00007FFA144A0000-memory.dmp

    Filesize

    128KB

  • memory/6568-3717-0x00007FFA14480000-0x00007FFA144A0000-memory.dmp

    Filesize

    128KB

  • memory/6568-3716-0x00007FFA14460000-0x00007FFA14470000-memory.dmp

    Filesize

    64KB

  • memory/6568-3715-0x00007FFA14460000-0x00007FFA14470000-memory.dmp

    Filesize

    64KB

  • memory/6568-3714-0x00007FFA143D0000-0x00007FFA143E0000-memory.dmp

    Filesize

    64KB

  • memory/6568-3708-0x00007FFA157F0000-0x00007FFA15820000-memory.dmp

    Filesize

    192KB

  • memory/6568-3706-0x00007FFA157A0000-0x00007FFA157B0000-memory.dmp

    Filesize

    64KB

  • memory/6568-3705-0x00007FFA157A0000-0x00007FFA157B0000-memory.dmp

    Filesize

    64KB

  • memory/6568-3704-0x00007FFA15680000-0x00007FFA15690000-memory.dmp

    Filesize

    64KB

  • memory/6568-3710-0x00007FFA157F0000-0x00007FFA15820000-memory.dmp

    Filesize

    192KB

  • memory/6568-3703-0x00007FFA15680000-0x00007FFA15690000-memory.dmp

    Filesize

    64KB

  • memory/6568-3722-0x00007FFA14570000-0x00007FFA1457C000-memory.dmp

    Filesize

    48KB

  • memory/6568-3709-0x00007FFA157F0000-0x00007FFA15820000-memory.dmp

    Filesize

    192KB

  • memory/6568-3711-0x00007FFA157F0000-0x00007FFA15820000-memory.dmp

    Filesize

    192KB

  • memory/6568-3712-0x00007FFA15880000-0x00007FFA15889000-memory.dmp

    Filesize

    36KB

  • memory/6568-3707-0x00007FFA157F0000-0x00007FFA15820000-memory.dmp

    Filesize

    192KB