Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 16:52
Behavioral task
behavioral1
Sample
XClientfpi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClientfpi.exe
Resource
win10v2004-20250217-en
General
-
Target
XClientfpi.exe
-
Size
62KB
-
MD5
3628a746ca388c9f72824334c8078834
-
SHA1
2bf50b5c42a37aaed6bba0481707c1ce52269c92
-
SHA256
ba5a98fbc6a2eaf3307b1e62af2c4224277adb3e2c510428095a0fc497749ecd
-
SHA512
8f418fa87316a052c6ef529ee5821a9c1e13d4980bcca06e458fd48acfa53014161464f5630f42c81629351ca3a45c7763e939325887084e029864cda0752bff
-
SSDEEP
768:mxQBlgZll1JRtVClBh5zpg5jtVuHYZ/rRa5gM5HnIimtZGguZb86c8uIJIIpSqnP:mLRt2X5zJGN0pI/hub8P8ngqhOPJu
Malware Config
Extracted
xworm
26.ip.gl.ply.gg:51287
-
Install_directory
%AppData%
-
install_file
windowscleaner.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/2092-1-0x0000000000040000-0x0000000000056000-memory.dmp family_xworm behavioral1/files/0x0007000000012117-10.dat family_xworm -
Xworm family
-
Deletes itself 1 IoCs
pid Process 2600 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windowscleaner.lnk XClientfpi.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windowscleaner.lnk XClientfpi.exe -
Executes dropped EXE 1 IoCs
pid Process 2816 windowscleaner.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\windowscleaner = "C:\\Users\\Admin\\AppData\\Roaming\\windowscleaner.exe" XClientfpi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2688 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2568 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2092 XClientfpi.exe Token: SeDebugPrivilege 2816 windowscleaner.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2568 2092 XClientfpi.exe 28 PID 2092 wrote to memory of 2568 2092 XClientfpi.exe 28 PID 2092 wrote to memory of 2568 2092 XClientfpi.exe 28 PID 2792 wrote to memory of 2816 2792 taskeng.exe 34 PID 2792 wrote to memory of 2816 2792 taskeng.exe 34 PID 2792 wrote to memory of 2816 2792 taskeng.exe 34 PID 2092 wrote to memory of 1724 2092 XClientfpi.exe 35 PID 2092 wrote to memory of 1724 2092 XClientfpi.exe 35 PID 2092 wrote to memory of 1724 2092 XClientfpi.exe 35 PID 2092 wrote to memory of 2600 2092 XClientfpi.exe 37 PID 2092 wrote to memory of 2600 2092 XClientfpi.exe 37 PID 2092 wrote to memory of 2600 2092 XClientfpi.exe 37 PID 2600 wrote to memory of 2688 2600 cmd.exe 39 PID 2600 wrote to memory of 2688 2600 cmd.exe 39 PID 2600 wrote to memory of 2688 2600 cmd.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClientfpi.exe"C:\Users\Admin\AppData\Local\Temp\XClientfpi.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "windowscleaner" /tr "C:\Users\Admin\AppData\Roaming\windowscleaner.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2568
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "windowscleaner"2⤵PID:1724
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp6F27.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2688
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B068058C-6591-4E85-B305-F70689DE5334} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Roaming\windowscleaner.exeC:\Users\Admin\AppData\Roaming\windowscleaner.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162B
MD547b1da9b60ac662b504236e03f30f29b
SHA188cb5f03145279129dbebdf9c385b7d73149ed7c
SHA2560af6b774b2d76e1959be2c228b45e4dbd8e8e1ef5c7310e45eec2a74161109ee
SHA512dfe4b10e02921321a3ff1917a79243c982c51da1195109f1278835bbeb5e0757c7974fd97a794d4b937dd8d2efd9dc6aea057ac3101f23f591adf4df8f4008dd
-
Filesize
62KB
MD53628a746ca388c9f72824334c8078834
SHA12bf50b5c42a37aaed6bba0481707c1ce52269c92
SHA256ba5a98fbc6a2eaf3307b1e62af2c4224277adb3e2c510428095a0fc497749ecd
SHA5128f418fa87316a052c6ef529ee5821a9c1e13d4980bcca06e458fd48acfa53014161464f5630f42c81629351ca3a45c7763e939325887084e029864cda0752bff