Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
23s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/11/2024, 09:48
Behavioral task
behavioral1
Sample
3116545d3502db62348b0b8cd70a2a02e38a82309489f09cf11f346958c4b8e7N.exe
Resource
win7-20240903-en
General
-
Target
3116545d3502db62348b0b8cd70a2a02e38a82309489f09cf11f346958c4b8e7N.exe
-
Size
79KB
-
MD5
6a38c40e75c6a8bf59c27f075ae8fe50
-
SHA1
dea1a6673aba42fff5091f1098530db6378b4843
-
SHA256
3116545d3502db62348b0b8cd70a2a02e38a82309489f09cf11f346958c4b8e7
-
SHA512
1740a10610ec5327089ea2a14e4750253a4059803ec7545432d63189a8cf31b2d6ec8ae8a4f6db5ae3070f1cdfc5c5eb05cdd65c8687f522f5f96244a1839c0d
-
SSDEEP
1536:j+GS0wR8+ABXjq7g3vcsHdfC7sbvYwugpeziN601wdB50OcvQVDdUq:j+F0wmxjqkfP1PbvYseijoB50Ocs6q
Malware Config
Extracted
xworm
where-reverse.gl.at.ply.gg:9999
-
Install_directory
%ProgramData%
-
install_file
Helper.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2648-1-0x0000000000FC0000-0x0000000000FDA000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2648 3116545d3502db62348b0b8cd70a2a02e38a82309489f09cf11f346958c4b8e7N.exe