Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 16:52
Behavioral task
behavioral1
Sample
XClientfpi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClientfpi.exe
Resource
win10v2004-20250217-en
General
-
Target
XClientfpi.exe
-
Size
62KB
-
MD5
3628a746ca388c9f72824334c8078834
-
SHA1
2bf50b5c42a37aaed6bba0481707c1ce52269c92
-
SHA256
ba5a98fbc6a2eaf3307b1e62af2c4224277adb3e2c510428095a0fc497749ecd
-
SHA512
8f418fa87316a052c6ef529ee5821a9c1e13d4980bcca06e458fd48acfa53014161464f5630f42c81629351ca3a45c7763e939325887084e029864cda0752bff
-
SSDEEP
768:mxQBlgZll1JRtVClBh5zpg5jtVuHYZ/rRa5gM5HnIimtZGguZb86c8uIJIIpSqnP:mLRt2X5zJGN0pI/hub8P8ngqhOPJu
Malware Config
Extracted
xworm
26.ip.gl.ply.gg:51287
-
Install_directory
%AppData%
-
install_file
windowscleaner.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/1100-1-0x0000000000260000-0x0000000000276000-memory.dmp family_xworm behavioral2/files/0x000400000001e0ff-8.dat family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation XClientfpi.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windowscleaner.lnk XClientfpi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windowscleaner.lnk XClientfpi.exe -
Executes dropped EXE 1 IoCs
pid Process 2100 windowscleaner.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windowscleaner = "C:\\Users\\Admin\\AppData\\Roaming\\windowscleaner.exe" XClientfpi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4236 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1624 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1100 XClientfpi.exe Token: SeDebugPrivilege 2100 windowscleaner.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1624 1100 XClientfpi.exe 92 PID 1100 wrote to memory of 1624 1100 XClientfpi.exe 92 PID 1100 wrote to memory of 4212 1100 XClientfpi.exe 109 PID 1100 wrote to memory of 4212 1100 XClientfpi.exe 109 PID 1100 wrote to memory of 1664 1100 XClientfpi.exe 111 PID 1100 wrote to memory of 1664 1100 XClientfpi.exe 111 PID 1664 wrote to memory of 4236 1664 cmd.exe 113 PID 1664 wrote to memory of 4236 1664 cmd.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClientfpi.exe"C:\Users\Admin\AppData\Local\Temp\XClientfpi.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "windowscleaner" /tr "C:\Users\Admin\AppData\Roaming\windowscleaner.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1624
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "windowscleaner"2⤵PID:4212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD164.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4236
-
-
-
C:\Users\Admin\AppData\Roaming\windowscleaner.exeC:\Users\Admin\AppData\Roaming\windowscleaner.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162B
MD50e149196a3663d0bbc037cc134cd056d
SHA121f2cd991539c623585469f21ca1fb3b80e922bf
SHA256c5e852400034c9f196abd7d37f9576ebae4e4c2b70a52392f179558709036541
SHA5127e4300350bb22be8ef4e1d983752020df489d8fc0e4e0e558d8f077c5f948482c0c7d83e56cce0b93a2edda5aeea0c2597a251bf6f26d32955d8c4eab3d1ce27
-
Filesize
62KB
MD53628a746ca388c9f72824334c8078834
SHA12bf50b5c42a37aaed6bba0481707c1ce52269c92
SHA256ba5a98fbc6a2eaf3307b1e62af2c4224277adb3e2c510428095a0fc497749ecd
SHA5128f418fa87316a052c6ef529ee5821a9c1e13d4980bcca06e458fd48acfa53014161464f5630f42c81629351ca3a45c7763e939325887084e029864cda0752bff