Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
SvdvD2oMxskKpFA.exe
Resource
win7-20240903-en
General
-
Target
SvdvD2oMxskKpFA.exe
-
Size
2.8MB
-
MD5
37449ec900f5315bd22abe4e4d8861ad
-
SHA1
584d45cfeb259c3b89cb7ed0734f0334f2432d59
-
SHA256
e737aeca763418b072714874598a77466634cc2f8d1133c5ca57ad0feae8ffb5
-
SHA512
41b857432e067b9f9f6e63c6b70c1d5d2388f2b7d40b8053ed3dcdc4b156fba1b0cdef62593b30e38fa542fe5514d129e2a614cc21833bd895dc73602c30684f
-
SSDEEP
24576:G5tXUp5hTtlRfyhaaJRjbEHi0zScrqkx03XssHftjQVM+PJxbHXDPvP/wYUIgH1b:Q3JtgecJ03X/x+M+rfwYUIgVY7vD
Malware Config
Extracted
xworm
-
Install_directory
%Userprofile%
-
install_file
injector.exe
-
pastebin_url
https://pastebin.com/raw/DSFaHH8B
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2016-18075-0x0000000000400000-0x0000000000418000-memory.dmp family_xworm behavioral1/memory/4304-36176-0x00000000000C0000-0x00000000000D8000-memory.dmp family_xworm behavioral1/memory/5468-54250-0x0000000000080000-0x0000000000098000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1520 powershell.exe 3108 powershell.exe 3264 powershell.exe 3424 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\injector.lnk SvdvD2oMxskKpFA.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\injector.lnk SvdvD2oMxskKpFA.exe -
Executes dropped EXE 4 IoCs
pid Process 4044 injector.exe 4304 injector.exe 5268 injector.exe 5468 injector.exe -
Loads dropped DLL 1 IoCs
pid Process 2016 SvdvD2oMxskKpFA.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\injector = "C:\\Users\\Admin\\injector.exe" SvdvD2oMxskKpFA.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2684 set thread context of 2016 2684 SvdvD2oMxskKpFA.exe 31 PID 4044 set thread context of 4304 4044 injector.exe 44 PID 5268 set thread context of 5468 5268 injector.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SvdvD2oMxskKpFA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SvdvD2oMxskKpFA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injector.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe 2684 SvdvD2oMxskKpFA.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2684 SvdvD2oMxskKpFA.exe Token: SeDebugPrivilege 2016 SvdvD2oMxskKpFA.exe Token: SeDebugPrivilege 1520 powershell.exe Token: SeDebugPrivilege 3108 powershell.exe Token: SeDebugPrivilege 3264 powershell.exe Token: SeDebugPrivilege 3424 powershell.exe Token: SeDebugPrivilege 2016 SvdvD2oMxskKpFA.exe Token: SeDebugPrivilege 4044 injector.exe Token: SeDebugPrivilege 4304 injector.exe Token: SeDebugPrivilege 5268 injector.exe Token: SeDebugPrivilege 5468 injector.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2016 SvdvD2oMxskKpFA.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2016 2684 SvdvD2oMxskKpFA.exe 31 PID 2684 wrote to memory of 2016 2684 SvdvD2oMxskKpFA.exe 31 PID 2684 wrote to memory of 2016 2684 SvdvD2oMxskKpFA.exe 31 PID 2684 wrote to memory of 2016 2684 SvdvD2oMxskKpFA.exe 31 PID 2684 wrote to memory of 2016 2684 SvdvD2oMxskKpFA.exe 31 PID 2684 wrote to memory of 2016 2684 SvdvD2oMxskKpFA.exe 31 PID 2684 wrote to memory of 2016 2684 SvdvD2oMxskKpFA.exe 31 PID 2684 wrote to memory of 2016 2684 SvdvD2oMxskKpFA.exe 31 PID 2684 wrote to memory of 2016 2684 SvdvD2oMxskKpFA.exe 31 PID 2016 wrote to memory of 1520 2016 SvdvD2oMxskKpFA.exe 32 PID 2016 wrote to memory of 1520 2016 SvdvD2oMxskKpFA.exe 32 PID 2016 wrote to memory of 1520 2016 SvdvD2oMxskKpFA.exe 32 PID 2016 wrote to memory of 1520 2016 SvdvD2oMxskKpFA.exe 32 PID 2016 wrote to memory of 3108 2016 SvdvD2oMxskKpFA.exe 34 PID 2016 wrote to memory of 3108 2016 SvdvD2oMxskKpFA.exe 34 PID 2016 wrote to memory of 3108 2016 SvdvD2oMxskKpFA.exe 34 PID 2016 wrote to memory of 3108 2016 SvdvD2oMxskKpFA.exe 34 PID 2016 wrote to memory of 3264 2016 SvdvD2oMxskKpFA.exe 36 PID 2016 wrote to memory of 3264 2016 SvdvD2oMxskKpFA.exe 36 PID 2016 wrote to memory of 3264 2016 SvdvD2oMxskKpFA.exe 36 PID 2016 wrote to memory of 3264 2016 SvdvD2oMxskKpFA.exe 36 PID 2016 wrote to memory of 3424 2016 SvdvD2oMxskKpFA.exe 38 PID 2016 wrote to memory of 3424 2016 SvdvD2oMxskKpFA.exe 38 PID 2016 wrote to memory of 3424 2016 SvdvD2oMxskKpFA.exe 38 PID 2016 wrote to memory of 3424 2016 SvdvD2oMxskKpFA.exe 38 PID 2016 wrote to memory of 3624 2016 SvdvD2oMxskKpFA.exe 40 PID 2016 wrote to memory of 3624 2016 SvdvD2oMxskKpFA.exe 40 PID 2016 wrote to memory of 3624 2016 SvdvD2oMxskKpFA.exe 40 PID 2016 wrote to memory of 3624 2016 SvdvD2oMxskKpFA.exe 40 PID 3972 wrote to memory of 4044 3972 taskeng.exe 43 PID 3972 wrote to memory of 4044 3972 taskeng.exe 43 PID 3972 wrote to memory of 4044 3972 taskeng.exe 43 PID 3972 wrote to memory of 4044 3972 taskeng.exe 43 PID 4044 wrote to memory of 4304 4044 injector.exe 44 PID 4044 wrote to memory of 4304 4044 injector.exe 44 PID 4044 wrote to memory of 4304 4044 injector.exe 44 PID 4044 wrote to memory of 4304 4044 injector.exe 44 PID 4044 wrote to memory of 4304 4044 injector.exe 44 PID 4044 wrote to memory of 4304 4044 injector.exe 44 PID 4044 wrote to memory of 4304 4044 injector.exe 44 PID 4044 wrote to memory of 4304 4044 injector.exe 44 PID 4044 wrote to memory of 4304 4044 injector.exe 44 PID 3972 wrote to memory of 5268 3972 taskeng.exe 45 PID 3972 wrote to memory of 5268 3972 taskeng.exe 45 PID 3972 wrote to memory of 5268 3972 taskeng.exe 45 PID 3972 wrote to memory of 5268 3972 taskeng.exe 45 PID 5268 wrote to memory of 5468 5268 injector.exe 46 PID 5268 wrote to memory of 5468 5268 injector.exe 46 PID 5268 wrote to memory of 5468 5268 injector.exe 46 PID 5268 wrote to memory of 5468 5268 injector.exe 46 PID 5268 wrote to memory of 5468 5268 injector.exe 46 PID 5268 wrote to memory of 5468 5268 injector.exe 46 PID 5268 wrote to memory of 5468 5268 injector.exe 46 PID 5268 wrote to memory of 5468 5268 injector.exe 46 PID 5268 wrote to memory of 5468 5268 injector.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\SvdvD2oMxskKpFA.exe"C:\Users\Admin\AppData\Local\Temp\SvdvD2oMxskKpFA.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\SvdvD2oMxskKpFA.exe"C:\Users\Admin\AppData\Local\Temp\SvdvD2oMxskKpFA.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\SvdvD2oMxskKpFA.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SvdvD2oMxskKpFA.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\injector.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'injector.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "injector" /tr "C:\Users\Admin\injector.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3624
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {28493C83-7BFD-4310-A177-DBD1D49F2196} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\injector.exeC:\Users\Admin\injector.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\injector.exe"C:\Users\Admin\injector.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
-
C:\Users\Admin\injector.exeC:\Users\Admin\injector.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5268 -
C:\Users\Admin\injector.exe"C:\Users\Admin\injector.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5468
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD58c321ee5f45395fc5e9c35b1e90f3ebd
SHA1ff7f6d37a2e2660faf33c6cdc8613759b286109a
SHA2561d16c3f7d46cbefcae5bb2f2d8c14f0cce2055bd1b46838877cacad5ba993e34
SHA512517501ac438062c71ce1685f771815f972662755d1785aa5d7598ac07d97614039ee1006e4ea358c6385778eec9596942396a5d5b06bd0f5cfbeb9e4f30c7add
-
Filesize
2.8MB
MD537449ec900f5315bd22abe4e4d8861ad
SHA1584d45cfeb259c3b89cb7ed0734f0334f2432d59
SHA256e737aeca763418b072714874598a77466634cc2f8d1133c5ca57ad0feae8ffb5
SHA51241b857432e067b9f9f6e63c6b70c1d5d2388f2b7d40b8053ed3dcdc4b156fba1b0cdef62593b30e38fa542fe5514d129e2a614cc21833bd895dc73602c30684f