Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
100033f75804...e5.exe
windows7-x64
10033f75804...e5.exe
windows10-2004-x64
100ecd8a50b...ab.exe
windows7-x64
1000ecd8a50b...ab.exe
windows10-2004-x64
1007f66695f4...21.exe
windows7-x64
807f66695f4...21.exe
windows10-2004-x64
809e259cbe7...ee.exe
windows7-x64
1009e259cbe7...ee.exe
windows10-2004-x64
100c41a305e8...cd.exe
windows7-x64
80c41a305e8...cd.exe
windows10-2004-x64
80ca149e59a...32.exe
windows7-x64
70ca149e59a...32.exe
windows10-2004-x64
1010ebd229b7...09.exe
windows7-x64
710ebd229b7...09.exe
windows10-2004-x64
7170b3d1749...5a.exe
windows7-x64
8170b3d1749...5a.exe
windows10-2004-x64
81b812937c3...1a.exe
windows7-x64
101b812937c3...1a.exe
windows10-2004-x64
101c7facff8b...44.exe
windows7-x64
101c7facff8b...44.exe
windows10-2004-x64
101d5d209fb6...fc.exe
windows7-x64
71d5d209fb6...fc.exe
windows10-2004-x64
1020b9ae8a5a...ad.exe
windows7-x64
820b9ae8a5a...ad.exe
windows10-2004-x64
821aaf28e05...f4.exe
windows7-x64
1021aaf28e05...f4.exe
windows10-2004-x64
1022ea24b9b0...6c.exe
windows7-x64
322ea24b9b0...6c.exe
windows10-2004-x64
32646ec6c76...0a.exe
windows7-x64
102646ec6c76...0a.exe
windows10-2004-x64
82963197f54...71.exe
windows7-x64
102963197f54...71.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
0033f75804f1bdff0d0bd5153a6114c3757da40fa823dd18a5742373a905a3e5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0033f75804f1bdff0d0bd5153a6114c3757da40fa823dd18a5742373a905a3e5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
00ecd8a50bb6f18b13df817d36962dd625cc98b05a90ef9f539c8506226790ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
00ecd8a50bb6f18b13df817d36962dd625cc98b05a90ef9f539c8506226790ab.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
07f66695f4dde786aabfdcb965764f4cc785308308a7d5b3d871373557b4e121.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
07f66695f4dde786aabfdcb965764f4cc785308308a7d5b3d871373557b4e121.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
09e259cbe7adb2947fdbf6b556ab82948a320042b2d4738988ac756d5539bfee.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
09e259cbe7adb2947fdbf6b556ab82948a320042b2d4738988ac756d5539bfee.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
0c41a305e80960e4c7c2c890fd707429091d3bb87d5726ed7c13373d626e85cd.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
0c41a305e80960e4c7c2c890fd707429091d3bb87d5726ed7c13373d626e85cd.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
0ca149e59a526c1811fcac3c14943acdbc43a3261af653670bc9e71436b1fc32.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0ca149e59a526c1811fcac3c14943acdbc43a3261af653670bc9e71436b1fc32.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
1c7facff8b5db7f2186d2574b32b72d5f00467e85f56189d461cec22b9b3b144.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
1c7facff8b5db7f2186d2574b32b72d5f00467e85f56189d461cec22b9b3b144.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
1d5d209fb69f3a9b4cb8799fb7be62b22df0fecee3a7ddd45d4504d5c2d311fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
1d5d209fb69f3a9b4cb8799fb7be62b22df0fecee3a7ddd45d4504d5c2d311fc.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
20b9ae8a5ac2fee80a07e504d2a6be09d2be39055b349baf7c38813e26d13fad.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
20b9ae8a5ac2fee80a07e504d2a6be09d2be39055b349baf7c38813e26d13fad.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
21aaf28e05a6224b2a5b338a738ff9321a56ebc2babe6b194709f9a00fb97af4.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
21aaf28e05a6224b2a5b338a738ff9321a56ebc2babe6b194709f9a00fb97af4.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
22ea24b9b0535d9687352b4a6208e299c4a64f79290c939f553b1eb9ec60706c.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
22ea24b9b0535d9687352b4a6208e299c4a64f79290c939f553b1eb9ec60706c.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
2646ec6c76057d721a872ba333ac65cd7d962fa27338923b8a2d18099ba0f00a.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
2646ec6c76057d721a872ba333ac65cd7d962fa27338923b8a2d18099ba0f00a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe
Resource
win10v2004-20250217-en
General
-
Target
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe
-
Size
11.1MB
-
MD5
e8d87522a8d9fde86d76c5e778fd921f
-
SHA1
b18fad7c0a4f43f4eeee03f9589433611341b909
-
SHA256
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471
-
SHA512
f84cbdaa241e3209bf18ce1e40b622e5d9335070c74770cf15371d7f90de71b702f9f8c4e03bca12227c7a3acc4cb12f87f16521a5a1435fe4968633f42f9e4b
-
SSDEEP
196608:X5vKjtcrItOBF+5/4iU/QnbU8ifQO6S8hHOV6guNYfyBNWZjpGqnLyXmEoT4:XtqtMItOBF+5/FQn6S8huVResZjUqLy6
Malware Config
Extracted
xworm
super-crisis.gl.at.ply.gg:9245
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral31/files/0x000500000001c88d-11.dat family_xworm behavioral31/memory/3008-14-0x0000000000AE0000-0x0000000000AF6000-memory.dmp family_xworm behavioral31/memory/2440-189-0x0000000000C70000-0x0000000000C86000-memory.dmp family_xworm behavioral31/memory/1712-192-0x0000000000380000-0x0000000000396000-memory.dmp family_xworm behavioral31/memory/2676-194-0x0000000000210000-0x0000000000226000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk loader.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk loader.exe -
Executes dropped EXE 6 IoCs
pid Process 2488 xyz.exe 3008 loader.exe 1208 xyz.exe 2440 XClient.exe 1712 XClient.exe 2676 XClient.exe -
Loads dropped DLL 10 IoCs
pid Process 3012 2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe 2076 Process not Found 2488 xyz.exe 1208 xyz.exe 1208 xyz.exe 1208 xyz.exe 1208 xyz.exe 1208 xyz.exe 1208 xyz.exe 1208 xyz.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" loader.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral31/files/0x0008000000019438-7.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1856 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3008 loader.exe Token: SeDebugPrivilege 2440 XClient.exe Token: SeDebugPrivilege 1712 XClient.exe Token: SeDebugPrivilege 2676 XClient.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2488 3012 2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe 30 PID 3012 wrote to memory of 2488 3012 2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe 30 PID 3012 wrote to memory of 2488 3012 2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe 30 PID 3012 wrote to memory of 3008 3012 2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe 32 PID 3012 wrote to memory of 3008 3012 2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe 32 PID 3012 wrote to memory of 3008 3012 2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe 32 PID 2488 wrote to memory of 1208 2488 xyz.exe 33 PID 2488 wrote to memory of 1208 2488 xyz.exe 33 PID 2488 wrote to memory of 1208 2488 xyz.exe 33 PID 3008 wrote to memory of 1856 3008 loader.exe 35 PID 3008 wrote to memory of 1856 3008 loader.exe 35 PID 3008 wrote to memory of 1856 3008 loader.exe 35 PID 1808 wrote to memory of 2440 1808 taskeng.exe 39 PID 1808 wrote to memory of 2440 1808 taskeng.exe 39 PID 1808 wrote to memory of 2440 1808 taskeng.exe 39 PID 1808 wrote to memory of 1712 1808 taskeng.exe 40 PID 1808 wrote to memory of 1712 1808 taskeng.exe 40 PID 1808 wrote to memory of 1712 1808 taskeng.exe 40 PID 1808 wrote to memory of 2676 1808 taskeng.exe 41 PID 1808 wrote to memory of 2676 1808 taskeng.exe 41 PID 1808 wrote to memory of 2676 1808 taskeng.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe"C:\Users\Admin\AppData\Local\Temp\2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\xyz.exe"C:\Users\Admin\AppData\Local\Temp\xyz.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\xyz.exe"C:\Users\Admin\AppData\Local\Temp\xyz.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1208
-
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1856
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {93C70552-BA1F-4DC5-9846-7A93C1E063B4} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD51c58526d681efe507deb8f1935c75487
SHA10e6d328faf3563f2aae029bc5f2272fb7a742672
SHA256ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2
SHA5128edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1
-
Filesize
21KB
MD5724223109e49cb01d61d63a8be926b8f
SHA1072a4d01e01dbbab7281d9bd3add76f9a3c8b23b
SHA2564e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210
SHA51219b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c
-
Filesize
21KB
MD5d12403ee11359259ba2b0706e5e5111c
SHA103cc7827a30fd1dee38665c0cc993b4b533ac138
SHA256f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781
SHA5129004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
61KB
MD54614aeda4f8c33c5353842691f0c47fd
SHA1f1f2efab7aa886427cc596ef4220a4e4e8969667
SHA256bf859f84aeae1d29a963fdf12d655e7a9bf06916076c3f1801578e03aeb3564d
SHA5129f601f509cb5e6fc935b9ba020b0ac1ced342a21975915bed3c5bafd261413f618c51e7f3c524c0b049ae99dc5fba859260e56ccc0abe1d4301bce999d2f8c8c
-
Filesize
11.2MB
MD559bf989ea5bcd0b647a9cca10de77cdc
SHA1b03d03fca3a4fb007ea14b51f2c604c866b77b80
SHA256d3ae7ab89178b1cf8d3cc88de78bf53298d2ab7ab7198c374cd1c42409dacf10
SHA512a9c98d366a9f37b0b0e2c4d693d694aba138864608337912463ef0435487070972da2afc4f9dc829353d234930106a69f6936589a94729f5c65622a074127d91
-
Filesize
18KB
MD5bfffa7117fd9b1622c66d949bac3f1d7
SHA1402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA2561ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f
-
Filesize
21KB
MD5517eb9e2cb671ae49f99173d7f7ce43f
SHA14ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab
SHA25657cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54
SHA512492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd