Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/11/2024, 09:37 UTC
Behavioral task
behavioral1
Sample
2d6c0c98d1025f342d82141ed5873c1b67b6ad7ed9034a13770f3227371d0c5a.exe
Resource
win7-20240903-en
General
-
Target
2d6c0c98d1025f342d82141ed5873c1b67b6ad7ed9034a13770f3227371d0c5a.exe
-
Size
35KB
-
MD5
06816c1ba5f896e555820b1f2f5926d0
-
SHA1
c5e9df298b0b0029a6411564cd278063e39c71a6
-
SHA256
2d6c0c98d1025f342d82141ed5873c1b67b6ad7ed9034a13770f3227371d0c5a
-
SHA512
6ed74f39beb5a4a52ba3953ff33bd2c9687048ed71a2b9d0cf80cf9f4229ae6e3e7fcc47d6f2115582b2876419036c07aa6c17ad6a93f11e831089168197a3f7
-
SSDEEP
384:QqtdZi5eAKu6VztV/MH3uY2AU7LpCkjx5e5h/KwGkzaubf0nc/C7WX3yO5I2jz7y:Yy2BGpC4Len/KwG4vbZVdq22CJ9UhFM
Malware Config
Extracted
xworm
-
Install_directory
%Temp%
-
install_file
Sistem X64.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1336-0-0x0000000000CD0000-0x0000000000CE0000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1336 2d6c0c98d1025f342d82141ed5873c1b67b6ad7ed9034a13770f3227371d0c5a.exe
Processes
Network
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.210.23.2.in-addr.arpaIN PTRResponse88.210.23.2.in-addr.arpaIN PTRa2-23-210-88deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request140.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestip-api.comIN AResponseip-api.comIN A208.95.112.1
-
GEThttp://ip-api.com/line/?fields=hosting2d6c0c98d1025f342d82141ed5873c1b67b6ad7ed9034a13770f3227371d0c5a.exeRemote address:208.95.112.1:80RequestGET /line/?fields=hosting HTTP/1.1
Host: ip-api.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/plain; charset=utf-8
Content-Length: 5
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTRResponse1.112.95.208.in-addr.arpaIN PTRip-apicom
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request98.117.19.2.in-addr.arpaIN PTRResponse98.117.19.2.in-addr.arpaIN PTRa2-19-117-98deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
208.95.112.1:80http://ip-api.com/line/?fields=hostinghttp2d6c0c98d1025f342d82141ed5873c1b67b6ad7ed9034a13770f3227371d0c5a.exe310 B 266 B 5 2
HTTP Request
GET http://ip-api.com/line/?fields=hostingHTTP Response
200
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
88.210.23.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
140.32.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
ip-api.com
DNS Response
208.95.112.1
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
71 B 95 B 1 1
DNS Request
1.112.95.208.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
56.163.245.4.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
98.117.19.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa