Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 10:14
Behavioral task
behavioral1
Sample
RuntimeBroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RuntimeBroker.exe
Resource
win10v2004-20250217-en
General
-
Target
RuntimeBroker.exe
-
Size
73KB
-
MD5
7a5408d9535b2e5db8d194f4d8b93c23
-
SHA1
c8c6caf9f750b4bc756b40c41f00c3ed3af7fbeb
-
SHA256
23ecee99ee4ab7a150f91d4202033a6629cf5af74d80b6a12c2396f1f775734f
-
SHA512
95ef1bdb1e56b3d9c6809586ea0d8ff197375584f8625748811dceb4783fb693749b49c3ed0890c23782946acec3ba5baadcf49735a87985e30f14081a365fd8
-
SSDEEP
1536:Jb2yCofWhUvuJJH9o2qMnfAQPJwz7opMfQxnbSUyJhb/KpKU+k6eeOJ5w0pIBAM:nWhUvuJB9o2qMnfAQPJKy1jyJhb/KHhO
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/DSFaHH8B
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2296-1-0x0000000000390000-0x00000000003A8000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2356 powershell.exe 1056 powershell.exe 2688 powershell.exe 2584 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Runtime Broker = "C:\\ProgramData\\Runtime Broker" RuntimeBroker.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2296 RuntimeBroker.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2356 powershell.exe 1056 powershell.exe 2688 powershell.exe 2584 powershell.exe 2296 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2296 RuntimeBroker.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 1056 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 2296 RuntimeBroker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2296 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2356 2296 RuntimeBroker.exe 31 PID 2296 wrote to memory of 2356 2296 RuntimeBroker.exe 31 PID 2296 wrote to memory of 2356 2296 RuntimeBroker.exe 31 PID 2296 wrote to memory of 1056 2296 RuntimeBroker.exe 33 PID 2296 wrote to memory of 1056 2296 RuntimeBroker.exe 33 PID 2296 wrote to memory of 1056 2296 RuntimeBroker.exe 33 PID 2296 wrote to memory of 2688 2296 RuntimeBroker.exe 35 PID 2296 wrote to memory of 2688 2296 RuntimeBroker.exe 35 PID 2296 wrote to memory of 2688 2296 RuntimeBroker.exe 35 PID 2296 wrote to memory of 2584 2296 RuntimeBroker.exe 37 PID 2296 wrote to memory of 2584 2296 RuntimeBroker.exe 37 PID 2296 wrote to memory of 2584 2296 RuntimeBroker.exe 37 PID 2296 wrote to memory of 2632 2296 RuntimeBroker.exe 39 PID 2296 wrote to memory of 2632 2296 RuntimeBroker.exe 39 PID 2296 wrote to memory of 2632 2296 RuntimeBroker.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Runtime Broker'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Runtime Broker'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Runtime Broker" /tr "C:\ProgramData\Runtime Broker"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2632
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {50B969B5-67FC-44CE-AE63-7AAD783CBD00} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵PID:1844
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD54ef3e39a87dc589e48ed8e4c4eef8172
SHA131097e42932efa625f11b27134ae29cab269e464
SHA256f3cace0797efbd1801aeebe2bd70a3020144b35643ba1aade3aaf6271e1048e7
SHA512f9a59365e8efa2fcd4589bc6a7daec7f85a630a89fe76b8fe6417f7ef2c924eb54806c12a8a2abd5ecdec4457ae348b16cef94f6757742a3906dcac482f1ca73