Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 11:44

General

  • Target

    44305bb8e277b9f7ae66a2e99a5173203366817e2ae6d5bf102bb3b6ca7c8518.exe

  • Size

    33KB

  • MD5

    43262d9ba2f21646f060f4b4fe5e778b

  • SHA1

    bf475f07e81720fd1e52002764821ad2a84f36eb

  • SHA256

    44305bb8e277b9f7ae66a2e99a5173203366817e2ae6d5bf102bb3b6ca7c8518

  • SHA512

    d26bb24c6d2e083091f2e30b5b2f2adc60cb0b3504d0c46e038fbc35dcfed0f9243171bb9e808c4ddc4a3e0f225615b3fd871777997e5be72d096231e8dccdd1

  • SSDEEP

    768:5MXta8q7wYEfUak1JhyF2G95bDJuOMhK/+1l:5MXtQ7RvakDgFj95bcOM+Cl

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

C2

zafa02.hopto.org:4545

Mutex

4tFixBcpe8fBC07n

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44305bb8e277b9f7ae66a2e99a5173203366817e2ae6d5bf102bb3b6ca7c8518.exe
    "C:\Users\Admin\AppData\Local\Temp\44305bb8e277b9f7ae66a2e99a5173203366817e2ae6d5bf102bb3b6ca7c8518.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    PID:2392

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2392-0-0x000007FEF5753000-0x000007FEF5754000-memory.dmp

    Filesize

    4KB

  • memory/2392-1-0x00000000009A0000-0x00000000009AE000-memory.dmp

    Filesize

    56KB

  • memory/2392-2-0x000007FEF5750000-0x000007FEF613C000-memory.dmp

    Filesize

    9.9MB

  • memory/2392-3-0x000007FEF5753000-0x000007FEF5754000-memory.dmp

    Filesize

    4KB

  • memory/2392-4-0x000007FEF5750000-0x000007FEF613C000-memory.dmp

    Filesize

    9.9MB