Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/05/2024, 18:03
240503-wm852acc9z 1003/05/2024, 18:02
240503-wmldzacc8x 1003/05/2024, 18:02
240503-wmksfafc32 1003/05/2024, 18:00
240503-wlpd8scc6x 1003/05/2024, 18:00
240503-wlngyafb95 1003/05/2024, 18:00
240503-wlm66sfb94 1003/05/2024, 18:00
240503-wlmweacc6v 1003/05/2024, 18:00
240503-wll9wafb92 1003/05/2024, 18:00
240503-wlly4sfb89 1003/05/2024, 18:00
240503-wllncafb88 10Analysis
-
max time kernel
74s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 18:02
Behavioral task
behavioral1
Sample
ent.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ent.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ent.exe
Resource
win10v2004-20240419-en
Errors
General
-
Target
ent.exe
-
Size
44KB
-
MD5
211661398474b9c96a1d704823d0e552
-
SHA1
5afcd1a87a69ea1c84a06fdf7079660133ceb28a
-
SHA256
c43fa1f0bbfbb8f91d9a339b97922494bf790c6b58bf973b56836ef52a3196cd
-
SHA512
51717923b8d063874d5216db14adbe506826715773845c17961c5e52ed072380ea8b9b75d55559f855e6f42c35c8dd984c055eb3d1f7bec02c62463423c96666
-
SSDEEP
768:trlZa605WoOu+tpBERbGTHDUgkbZCfr2A33O3sh0l0E:tfq0u+tpKbAjXkbZCjjO3s60E
Malware Config
Extracted
xworm
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/XzLzRHpk
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2368-1-0x00000000001E0000-0x00000000001F2000-memory.dmp family_xworm -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 6 0.tcp.eu.ngrok.io 4 pastebin.com 5 pastebin.com -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2368 ent.exe Token: SeShutdownPrivilege 2772 shutdown.exe Token: SeRemoteShutdownPrivilege 2772 shutdown.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2772 2368 ent.exe 31 PID 2368 wrote to memory of 2772 2368 ent.exe 31 PID 2368 wrote to memory of 2772 2368 ent.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ent.exe"C:\Users\Admin\AppData\Local\Temp\ent.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\shutdown.exeshutdown.exe /f /s /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2836
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2004