Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 18:26
Behavioral task
behavioral1
Sample
XClientpidaras.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
XClientpidaras.exe
-
Size
69KB
-
MD5
a707d15921c6043a7fbb95dd94b0bd68
-
SHA1
0ba8feed0de0b26ecc7e86c8dc33a1e961176075
-
SHA256
8615911309f47f5540b2a3d340a12320dda86d2a029ed358315f3e3dac9fef08
-
SHA512
2aa2ff6a434e71553171e257d723ecb319c9fc74ab9a2684e40d2b448421587f45cb8607a8d38e6ce731b04f0bc93013ffadf4441ec9750ed9d48893c110d237
-
SSDEEP
1536:UTYFWL2D3I3Ev4rIRzGgbTR6gkq0hjk6fVMKlXOebtQV:gYf7QczHbTRNgjrMAOebmV
Malware Config
Extracted
Family
xworm
Attributes
-
Install_directory
%Temp%
-
install_file
chyrka228.exe
-
pastebin_url
https://pastebin.com/raw/MdxXj6A4
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1232-1-0x0000000000C40000-0x0000000000C58000-memory.dmp family_xworm -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ip-api.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 388 mspaint.exe 388 mspaint.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1232 XClientpidaras.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 388 mspaint.exe 388 mspaint.exe 388 mspaint.exe 388 mspaint.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClientpidaras.exe"C:\Users\Admin\AppData\Local\Temp\XClientpidaras.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\UndoTest.bmp"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4544