Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/11/2024, 15:07
Behavioral task
behavioral1
Sample
f4f17374c562f0e0185fb1aac2c88f4485e8a860fa45c28054abdd2f3baffc7b.exe
Resource
win7-20240903-en
General
-
Target
f4f17374c562f0e0185fb1aac2c88f4485e8a860fa45c28054abdd2f3baffc7b.exe
-
Size
41KB
-
MD5
b87a3462fe55f8ea086cceb9f38c256c
-
SHA1
9b766689841018cc78af1da632a4dd63c1c93248
-
SHA256
f4f17374c562f0e0185fb1aac2c88f4485e8a860fa45c28054abdd2f3baffc7b
-
SHA512
18384fa215ed6754def37de783624ebdc815ce4b7fe58ded62969657541ae6691eba299541d36eff147ec25f8f0e077637a63144f8c972638703c09dfe765b12
-
SSDEEP
768:GLA7VckJad7E8u8/GRGVKh6cV2JF5P89OY8D6BOMhN3/f9:GLEad7E5ynVej+FC998D6BOM7N
Malware Config
Extracted
xworm
5.0
shoes-since.gl.at.ply.gg:49960
EBl5SisJPrAWMF4z
-
Install_directory
%AppData%
-
install_file
WindowsAntivirus.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2568-1-0x0000000000DC0000-0x0000000000DD0000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 f4f17374c562f0e0185fb1aac2c88f4485e8a860fa45c28054abdd2f3baffc7b.exe