Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
1ff08d4cbe1a41c10692941c7835b93ea5738057dc381cf4704136436911df05.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ff08d4cbe1a41c10692941c7835b93ea5738057dc381cf4704136436911df05.exe
Resource
win10v2004-20241007-en
General
-
Target
e796b778b392f06de4d340ec0f88b4cc.bin
-
Size
93KB
-
MD5
e7b6369fca4a5f61847ae26f133fc90a
-
SHA1
6b0b23666a4a6547021b9fe2ae9b01dfdbfe4d59
-
SHA256
18d37313e2031210a8fc92e46838675fe446b1d43f927ab765b8020f133e6522
-
SHA512
da27f43d32982ef85f3da325f7da5f3207c05a703c0156f04c98347dcaab40e940ad6243f0fb99886d6eee00af85ae96d5ad7a99920a8eeeb980ba066eae13de
-
SSDEEP
1536:0G6W8MYUuEOI6Q+qy1Gt+YbEydftDCkSpKf9agsb1S1XBGcTn6HhFFy0l+:VIELwqyWbE2tDCkiK8U1XByvFy0l+
Malware Config
Extracted
xworm
23.ip.gl.ply.gg:57660
-
Install_directory
%AppData%
-
install_file
msedge.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule static1/unpack001/1ff08d4cbe1a41c10692941c7835b93ea5738057dc381cf4704136436911df05.exe family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1ff08d4cbe1a41c10692941c7835b93ea5738057dc381cf4704136436911df05.exe
Files
-
e796b778b392f06de4d340ec0f88b4cc.bin.zip
Password: infected
-
1ff08d4cbe1a41c10692941c7835b93ea5738057dc381cf4704136436911df05.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ