Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 10:32
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20250217-en
General
-
Target
XClient.exe
-
Size
64KB
-
MD5
1ff6154dbcb71d60e924548345b984da
-
SHA1
075b5dbfbe99a2bc6e01db6c831a06878ff5cfbe
-
SHA256
a973208f7dff8f3ef5777da04f73415801f2f2ded3ea44077ca9a695a7965d66
-
SHA512
7bee117cdec90e0a1a7efa62679423d70b585e8d5de6f54a44241e4a44bca789d2c3eeebe85112bf88688e40abd3511308d0c2c6d3c42f69575e156d569ef2e3
-
SSDEEP
1536:LdUF8CEWGeTI9jApgc+bMuWGZnJ8p6uovO9bkMx:9WHI9Epgc+bMubJ8QvO9bHx
Malware Config
Extracted
xworm
adrianmoritoru-34347.portmap.io:7000
192.168.150.131:7000
-
Install_directory
%Userprofile%
-
install_file
injector.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2500-1-0x0000000000C50000-0x0000000000C66000-memory.dmp family_xworm behavioral1/files/0x000e000000012263-37.dat family_xworm behavioral1/memory/1192-39-0x00000000013C0000-0x00000000013D6000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2948 powershell.exe 2704 powershell.exe 2708 powershell.exe 2740 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\injector.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\injector.lnk XClient.exe -
Executes dropped EXE 2 IoCs
pid Process 1192 injector.exe 336 injector.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\injector = "C:\\Users\\Admin\\injector.exe" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3012 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2948 powershell.exe 2704 powershell.exe 2708 powershell.exe 2740 powershell.exe 2500 XClient.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2500 XClient.exe Token: SeDebugPrivilege 2948 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 2740 powershell.exe Token: SeDebugPrivilege 2500 XClient.exe Token: SeDebugPrivilege 1192 injector.exe Token: SeDebugPrivilege 336 injector.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2500 XClient.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2948 2500 XClient.exe 30 PID 2500 wrote to memory of 2948 2500 XClient.exe 30 PID 2500 wrote to memory of 2948 2500 XClient.exe 30 PID 2500 wrote to memory of 2704 2500 XClient.exe 32 PID 2500 wrote to memory of 2704 2500 XClient.exe 32 PID 2500 wrote to memory of 2704 2500 XClient.exe 32 PID 2500 wrote to memory of 2708 2500 XClient.exe 34 PID 2500 wrote to memory of 2708 2500 XClient.exe 34 PID 2500 wrote to memory of 2708 2500 XClient.exe 34 PID 2500 wrote to memory of 2740 2500 XClient.exe 36 PID 2500 wrote to memory of 2740 2500 XClient.exe 36 PID 2500 wrote to memory of 2740 2500 XClient.exe 36 PID 2500 wrote to memory of 3012 2500 XClient.exe 38 PID 2500 wrote to memory of 3012 2500 XClient.exe 38 PID 2500 wrote to memory of 3012 2500 XClient.exe 38 PID 2504 wrote to memory of 1192 2504 taskeng.exe 42 PID 2504 wrote to memory of 1192 2504 taskeng.exe 42 PID 2504 wrote to memory of 1192 2504 taskeng.exe 42 PID 2504 wrote to memory of 336 2504 taskeng.exe 43 PID 2504 wrote to memory of 336 2504 taskeng.exe 43 PID 2504 wrote to memory of 336 2504 taskeng.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\injector.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'injector.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "injector" /tr "C:\Users\Admin\injector.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3012
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {52B67B2F-50E5-486E-B2B7-187E08355860} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\injector.exeC:\Users\Admin\injector.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Users\Admin\injector.exeC:\Users\Admin\injector.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:336
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5bc8095ac04af420e2cd3684546dbf9e8
SHA1ab205e73fcf82758949e62d26687be671f341596
SHA256be001adb1b3a434517905ae200b1cb579744b1a4539720a9d21c90a62fe8de5c
SHA512961ea7a7b56215ece0533cc5e2aa5bdc3541063baa9f65aec76aa997247b545f8e0e0728169f0b577d3481ae7398236021dac41a8adc4843ce93498ac46c9226
-
Filesize
64KB
MD51ff6154dbcb71d60e924548345b984da
SHA1075b5dbfbe99a2bc6e01db6c831a06878ff5cfbe
SHA256a973208f7dff8f3ef5777da04f73415801f2f2ded3ea44077ca9a695a7965d66
SHA5127bee117cdec90e0a1a7efa62679423d70b585e8d5de6f54a44241e4a44bca789d2c3eeebe85112bf88688e40abd3511308d0c2c6d3c42f69575e156d569ef2e3