Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad
-
Size
79KB
-
Sample
240612-qlft7szdrl
-
MD5
f1e41321cd4394089842e5121d5cb649
-
SHA1
96e3aff8a0eecda81e8d0b10323a1680b1136387
-
SHA256
401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad
-
SHA512
243adaeca82d89fa982c839c0b730b26e32a228d8e493edb04508f416b262334263c435fead1bffa3ad54a2b574e99cae2fa82d13d2d0c3dbca28c5184f4c9e3
-
SSDEEP
1536:IU8SlJ3N8bspa09DfVtHbRZuBDXcCK68u2yOeYdXGnE1B:cSlJrDHbRZMDXUmO9Wn6B
Behavioral task
behavioral1
Sample
401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
listing-trackbacks.gl.at.ply.gg:8848
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad
-
Size
79KB
-
MD5
f1e41321cd4394089842e5121d5cb649
-
SHA1
96e3aff8a0eecda81e8d0b10323a1680b1136387
-
SHA256
401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad
-
SHA512
243adaeca82d89fa982c839c0b730b26e32a228d8e493edb04508f416b262334263c435fead1bffa3ad54a2b574e99cae2fa82d13d2d0c3dbca28c5184f4c9e3
-
SSDEEP
1536:IU8SlJ3N8bspa09DfVtHbRZuBDXcCK68u2yOeYdXGnE1B:cSlJrDHbRZMDXUmO9Wn6B
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-