Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 21:04
Behavioral task
behavioral1
Sample
XWorm.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XWorm.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
XWorm.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral4
Sample
XWorm.exe
Resource
win11-20250217-en
General
-
Target
XWorm.exe
-
Size
41KB
-
MD5
757b77639d03590aa5d1cf21d08bc27e
-
SHA1
5b74577f9e5dbb7d4164de5f539381b1258f815f
-
SHA256
6cb26daf0ab888c6507fe5004eeb06ca66605664b2bda40179030e5e5d0e483a
-
SHA512
65d2ad77a11344127cbdd46f3e42812fd73b4e5c8e4084f1be40027326dca37294a1e82988b436c6c3d30ee4e004ec7c18710e4cd4eeea413b661700283351fe
-
SSDEEP
768:go8PvgoKrwdlS/shShk9lYAT9GKdQ9jGxZIRRTO:gdjMwdl3SGYKpQ9yg/TO
Malware Config
Extracted
xworm
any-attraction.gl.at.ply.gg:27770
8RhEzW61BTZ3YwGr
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/1616-1-0x0000000000CF0000-0x0000000000D00000-memory.dmp family_xworm behavioral2/files/0x000300000001e64a-6.dat family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation XWorm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWorm.exe XWorm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWorm.exe XWorm.exe -
Executes dropped EXE 4 IoCs
pid Process 4868 XWorm.exe 5300 ngrok.exe 4812 XWorm.exe 2008 XWorm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XWorm = "C:\\Users\\Admin\\AppData\\Roaming\\XWorm.exe" XWorm.exe -
resource yara_rule behavioral2/files/0x0004000000022b5e-19.dat upx behavioral2/memory/5300-25-0x0000000000F50000-0x0000000002A19000-memory.dmp upx behavioral2/memory/5300-27-0x0000000000F50000-0x0000000002A19000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngrok.exe -
Kills process with taskkill 1 IoCs
pid Process 5080 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5300 ngrok.exe 5300 ngrok.exe 5300 ngrok.exe 5300 ngrok.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5080 taskkill.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3720 1616 XWorm.exe 87 PID 1616 wrote to memory of 3720 1616 XWorm.exe 87 PID 1616 wrote to memory of 5080 1616 XWorm.exe 107 PID 1616 wrote to memory of 5080 1616 XWorm.exe 107 PID 1616 wrote to memory of 5300 1616 XWorm.exe 109 PID 1616 wrote to memory of 5300 1616 XWorm.exe 109 PID 1616 wrote to memory of 5300 1616 XWorm.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm.exe"C:\Users\Admin\AppData\Local\Temp\XWorm.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "XWorm" /tr "C:\Users\Admin\AppData\Roaming\XWorm.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3720
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill.exe /im ngrok.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\ngrok.exeC:\Users\Admin\AppData\Local\Temp\ngrok.exe authtoken Your_Authtoken2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5300
-
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:4868
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:4812
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:2008
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a8a147915e3a996fdbe10b3a3f1e1bb2
SHA1abc564c1be468d57e700913e7b6cf8f62d421263
SHA2568b96a8557deea66696837af011843d6a82451ba57c8f9b5a2726a70818d6fc7e
SHA51217b42f17ef60a9f625703172763f692e5ed2ca93564a97853dfa72bb0ac6305ef3267aea0b205938e3aa8eac10156d9d4f322b30d0329d92d647bcec6372731c
-
Filesize
12.2MB
MD5ace44294213ca5ad0a4ae2eb3c786509
SHA18d208075dc5d00af7ead68ae7bd569b50ecdae01
SHA256b41502b3e3fbd5d2617fac2c6a136515eea2525f2b0530d62c5797c80c0c1e02
SHA51262c4bc3f0a7a958131f993b174b91c26c23d75c102e8d2c34d20c84fc7fbb2aca2d71bc0b78dc226eb6143cb3e1a8111c712b028b185c7e888b1278e55557f0b
-
Filesize
41KB
MD5757b77639d03590aa5d1cf21d08bc27e
SHA15b74577f9e5dbb7d4164de5f539381b1258f815f
SHA2566cb26daf0ab888c6507fe5004eeb06ca66605664b2bda40179030e5e5d0e483a
SHA51265d2ad77a11344127cbdd46f3e42812fd73b4e5c8e4084f1be40027326dca37294a1e82988b436c6c3d30ee4e004ec7c18710e4cd4eeea413b661700283351fe