Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
VelocitySupportTool.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
VelocitySupportTool.exe
Resource
win10v2004-20250217-en
General
-
Target
VelocitySupportTool.exe
-
Size
10.1MB
-
MD5
67462ee5d9b46994eeb4a4c17410a206
-
SHA1
208514cd39b81476b31edbf2d56f6ef8e9e6870f
-
SHA256
327e9385019706a31563b32a12a5cff31ca042078a0ccb8c9e668d1bd12a6497
-
SHA512
ef551052fa54fdc2b7818f3dc6e6163a1301b413762ba69916347e3a4acfd2d9c3e878e732b66c05283f6c922f49a96a00bcd1655d7c2ba2ac363802efa78f94
-
SSDEEP
196608:SgNsPPpW0RYeIeKkrAW4LQkhf+LYYlrlJQxSQcGKQ999uvqivV9CSxTcf7nL:RKhW0afk0ZLQkhfNYGdH999VivOYeLL
Malware Config
Extracted
xworm
-
Install_directory
%port%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/k7RJ4RZQ
Extracted
xworm
5.0
0PPzuWGEdxzyPz40
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/0AT3JnEx
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/files/0x00070000000186ca-15.dat family_xworm behavioral1/files/0x00060000000186d9-14.dat family_xworm behavioral1/memory/2812-21-0x00000000000C0000-0x00000000000D0000-memory.dmp family_xworm behavioral1/memory/1376-20-0x0000000000970000-0x0000000000990000-memory.dmp family_xworm behavioral1/memory/3240-1942-0x0000000000F80000-0x0000000000F90000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2784 powershell.exe 1272 powershell.exe 2808 powershell.exe 2636 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk VelocityFix.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk VelocityFix.exe -
Executes dropped EXE 7 IoCs
pid Process 1632 VelocitySupportTool.exe 2812 VelocityFix.exe 1376 VelocitySupportTools.exe 2828 VelocitySupport.exe 2308 VelocitySupport.exe 3240 svchost.exe 3640 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2340 VelocitySupportTool.exe 2308 VelocitySupport.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" VelocityFix.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x00060000000186dd-22.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2784 powershell.exe 1272 powershell.exe 2808 powershell.exe 2636 powershell.exe 2812 VelocityFix.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1376 VelocitySupportTools.exe Token: SeDebugPrivilege 2812 VelocityFix.exe Token: SeDebugPrivilege 2784 powershell.exe Token: SeDebugPrivilege 1272 powershell.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 2812 VelocityFix.exe Token: SeDebugPrivilege 3240 svchost.exe Token: SeDebugPrivilege 3640 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2812 VelocityFix.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1632 2340 VelocitySupportTool.exe 30 PID 2340 wrote to memory of 1632 2340 VelocitySupportTool.exe 30 PID 2340 wrote to memory of 1632 2340 VelocitySupportTool.exe 30 PID 1632 wrote to memory of 1376 1632 VelocitySupportTool.exe 31 PID 1632 wrote to memory of 1376 1632 VelocitySupportTool.exe 31 PID 1632 wrote to memory of 1376 1632 VelocitySupportTool.exe 31 PID 1632 wrote to memory of 2812 1632 VelocitySupportTool.exe 32 PID 1632 wrote to memory of 2812 1632 VelocitySupportTool.exe 32 PID 1632 wrote to memory of 2812 1632 VelocitySupportTool.exe 32 PID 2340 wrote to memory of 2828 2340 VelocitySupportTool.exe 33 PID 2340 wrote to memory of 2828 2340 VelocitySupportTool.exe 33 PID 2340 wrote to memory of 2828 2340 VelocitySupportTool.exe 33 PID 2828 wrote to memory of 2308 2828 VelocitySupport.exe 37 PID 2828 wrote to memory of 2308 2828 VelocitySupport.exe 37 PID 2828 wrote to memory of 2308 2828 VelocitySupport.exe 37 PID 2812 wrote to memory of 2784 2812 VelocityFix.exe 38 PID 2812 wrote to memory of 2784 2812 VelocityFix.exe 38 PID 2812 wrote to memory of 2784 2812 VelocityFix.exe 38 PID 2812 wrote to memory of 1272 2812 VelocityFix.exe 40 PID 2812 wrote to memory of 1272 2812 VelocityFix.exe 40 PID 2812 wrote to memory of 1272 2812 VelocityFix.exe 40 PID 2812 wrote to memory of 2808 2812 VelocityFix.exe 42 PID 2812 wrote to memory of 2808 2812 VelocityFix.exe 42 PID 2812 wrote to memory of 2808 2812 VelocityFix.exe 42 PID 2812 wrote to memory of 2636 2812 VelocityFix.exe 44 PID 2812 wrote to memory of 2636 2812 VelocityFix.exe 44 PID 2812 wrote to memory of 2636 2812 VelocityFix.exe 44 PID 2812 wrote to memory of 2916 2812 VelocityFix.exe 46 PID 2812 wrote to memory of 2916 2812 VelocityFix.exe 46 PID 2812 wrote to memory of 2916 2812 VelocityFix.exe 46 PID 3208 wrote to memory of 3240 3208 taskeng.exe 49 PID 3208 wrote to memory of 3240 3208 taskeng.exe 49 PID 3208 wrote to memory of 3240 3208 taskeng.exe 49 PID 3208 wrote to memory of 3640 3208 taskeng.exe 50 PID 3208 wrote to memory of 3640 3208 taskeng.exe 50 PID 3208 wrote to memory of 3640 3208 taskeng.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VelocitySupportTool.exe"C:\Users\Admin\AppData\Local\Temp\VelocitySupportTool.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Roaming\VelocitySupportTool.exe"C:\Users\Admin\AppData\Roaming\VelocitySupportTool.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\VelocitySupportTools.exe"C:\Users\Admin\AppData\Roaming\VelocitySupportTools.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Users\Admin\AppData\Roaming\VelocityFix.exe"C:\Users\Admin\AppData\Roaming\VelocityFix.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\VelocityFix.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VelocityFix.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2916
-
-
-
-
C:\Users\Admin\AppData\Roaming\VelocitySupport.exe"C:\Users\Admin\AppData\Roaming\VelocitySupport.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\VelocitySupport.exe"C:\Users\Admin\AppData\Roaming\VelocitySupport.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2308
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {341ED9A1-FCB8-4FAC-859E-E830B36CD62F} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD5501080884bed38cb8801a307c9d7b7b4
SHA1881b250cc8f4fa4f75111ac557a4fde8e1e217af
SHA256bf68cf819a1e865170430c10e91c18b427aef88db1da1742020443864aa2b749
SHA51263d74a4871d1c72c2a79ae8a5d380070f9d2128c16949c3ad36c9862fcc4dab738137ed3d51caf0bc46b36655f8bd8a2d425d68200123415ee8d4de0e1cbebc9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5a572e1de73460e3578a1aa4019663cc5
SHA13bd07dc8d51c0b110ac5f88d702593d880235aa0
SHA25640160c26ff7aad6830d39337f7056298c0dd067d3e8ce71caa04f2b96060cd7c
SHA512c88342bbb5d0f3b680bd09a8885417d4dcad181ade78747dff6575ba14ea3ee9ac5933ebff4a4fd996a55dc6f60b09b9676b0ef656bf8bddb2bfe8da647fe20d
-
Filesize
39KB
MD553bfc0f8986b70724e4823f47241f6aa
SHA162e79122cea2f27e6f093fa484e5aa7795088ccc
SHA2569286f18acfd1a8277f23da9a1079b571587c9bd5f28dbcff51845b933595426c
SHA5125abbfbcc2e5cff491f4d213f4b83047f50e1de77d67631d510c7b540965c5f03a7611a0f1e79479d3a05a1e2f05fee6180b47ececc96c78f2e38ee5fa06430f2
-
Filesize
250KB
MD51904b43012a89c4ec5b3c82c7f7e313e
SHA13b0eedb1ba0bff205b9d099dd355091229007d04
SHA2561446224da9810c06e7336730dab3811c39c8d1d4b200c4e7d568b1440b432f61
SHA512c37e6bba9776516201c28367dcb541ac108a1def13d72eaf311800710c854a794835b7b92075e3b5d61ff3c500e1446004479065e418e3cb0dfb41963123a06e
-
Filesize
103KB
MD53d47fe184f91ceb1bd0d4c213da5ebfa
SHA105ca3411a2b89f0c7884024f48b51e7574862992
SHA256f0879c8017351b9cebbb546ea14f323ddb777cd97e435bb2de904ac28aa8525f
SHA5121975ed404e30d674806a8209982cf5c81ec7b057178e5597195ca89d79406ddc1edcd25a3e6098e74ac5ce220e9a9975cb2bcbff4d2de8abfa7952c1902ff256
-
Filesize
9.8MB
MD538c4223ac857cb56e3014d33c2062d05
SHA1d32150012ab49dad1f1c7ad3b68b2e3c483f81f5
SHA256cbcb51837d0ebd8fcae0dfa61ba516c103c34ca56a0aef400a2d14e9610cb43e
SHA512f000154ce3e2fb06fc98d1cf8d867996c0fc2747aefc24a7d091a13443316396e24080aafffdb048de1b37ab360265afe7cee31ab07c7eb246e293b50c0edfa7