Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
19/01/2025, 17:57
General
-
Target
XClient.exe
-
Size
66KB
-
MD5
54286d10288e571cb66646efe5082b29
-
SHA1
67251f59524c0b81ee0b510cdbb88daf1944d683
-
SHA256
103cf805515f6e873e731be2c481f7877663733a503268a2fc50011fec7b919f
-
SHA512
25cf99c225d9c7004de46fe4285b55baabe6ff34802d99cdb184468b9145c9287035708fc3143c5f2890c2381b106cd5716e1ab799cba57fb625e447722a1f9f
-
SSDEEP
1536:Lc2QLq2sAg41CgiIM28gtY3+bMRDR3Y0O22RSYEsDB:LcTr1MDgm+bM3O2GZEQB
Malware Config
Extracted
Family
xworm
C2
2.tcp.ngrok.io:14524
Attributes
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4472-1-0x00000000009B0000-0x00000000009C6000-memory.dmp family_xworm -
Xworm family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 49 2.tcp.ngrok.io 54 2.tcp.ngrok.io 8 2.tcp.ngrok.io 37 2.tcp.ngrok.io -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4472 XClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4472 XClient.exe Token: SeDebugPrivilege 4472 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4472 XClient.exe