Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/01/2024, 19:34
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
XClient.exe
-
Size
34KB
-
MD5
fefcb4063d5fa6b6f7e18df15d898a4b
-
SHA1
191fa40f80347e5a7d359e2a7c1e7e896e13b8f8
-
SHA256
8fd923fdc56266a3739f8ca0cdcbb97973cf7c84e1585eed90faf80e0a03d670
-
SHA512
ccc402ac3b99b590b543103291eb12737d3aff1fbced9b29cc174cdacbc35e646b09d41a23d3d35b0316b9443a0533abcfa391578fedaea5a92e55dca3fb5f90
-
SSDEEP
768:sWHqIHRXYauPNhzIgtoFj9Fy9YkROjhR/dcU:sWhxX9u0gtoPFy9YQOj71cU
Score
10/10
Malware Config
Extracted
Family
xworm
Version
5.0
C2
brazzers7.ddns.net:9091
Mutex
kaRc2zySHJ0ZFYY2
Attributes
-
Install_directory
%AppData%
-
install_file
vray.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2288-0-0x0000000000E80000-0x0000000000E8E000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vray.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vray.lnk XClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\vray = "C:\\Users\\Admin\\AppData\\Roaming\\vray.exe" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2288 XClient.exe