Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
Everything.exe
Resource
win10v2004-20240709-en
General
-
Target
Everything.exe
-
Size
1.1MB
-
MD5
574e3b1c4f468cf59768cf5ef84aeedc
-
SHA1
ee826303db0bd1c8cdf79095b9297608df2f8891
-
SHA256
f2b7f2e4d4b1e2552c5739f1d790b39a99b0487f2fb0696fb683d4dfc29a913b
-
SHA512
312f4873cd47457e5c422f1a86343d7d91d935074fe8145c8da03a6244e4c36da1e532e38086ecf86f739f4cddeee978825a39af79da1b40c344cda71a64f8be
-
SSDEEP
24576:YP3HZagB7Jn6C5cZiLQ7ZCyEib1GZexgvOxxH8Z3:Yf5aUsZ9sHibODvOx6Z3
Malware Config
Extracted
xworm
rights-refers.gl.at.ply.gg:8848
localhost:8848
127.0.0.1:8848
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1184-2-0x0000000000430000-0x000000000087C000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk Everything.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk Everything.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" Everything.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe 1184 Everything.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Everything.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1184 Everything.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1184 Everything.exe Token: SeDebugPrivilege 1184 Everything.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1184 Everything.exe 1184 Everything.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Everything.exe"C:\Users\Admin\AppData\Local\Temp\Everything.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1184