Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
80s -
max time network
82s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
08/03/2025, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
sex.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sex.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
sex.exe
Resource
win10ltsc2021-20250217-en
Errors
General
-
Target
sex.exe
-
Size
108KB
-
MD5
172786ddde922ef8c738488188957be6
-
SHA1
d3ac8d959d7ed442c91759ce4f6d1fd1bd271512
-
SHA256
cf72e60bc72abd3c24aaeaf3382f2ca4d9c78fad4f0e4c0e766eb999fa4fd11d
-
SHA512
105289eb9c168dc859e31b9b37e76c80b000960e88b6e6f0df7ade3a8938b94ccfb087272564af28fc7d56b2bf6681b414cc59d866f9f0ad17afd208bdb430b3
-
SSDEEP
1536:v2SENAgpuW+LpyOQGTrePk5QgKYXsIpsd0tiA/EdipjNd+FXwD+X4vBr52WBHPsH:OSENABoCoonMyBBzvBXvWjO+L
Malware Config
Extracted
xworm
3.1
any-attraction.gl.at.ply.gg:27770
B33wn5oKUxMok1Li
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral3/memory/5012-5-0x0000014CF48E0000-0x0000014CF48EE000-memory.dmp family_xworm -
Xworm family
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "123" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5012 sex.exe Token: SeDebugPrivilege 1152 taskmgr.exe Token: SeSystemProfilePrivilege 1152 taskmgr.exe Token: SeCreateGlobalPrivilege 1152 taskmgr.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe -
Suspicious use of SendNotifyMessage 49 IoCs
pid Process 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4824 LogonUI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sex.exe"C:\Users\Admin\AppData\Local\Temp\sex.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1152
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39da055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4824