Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2025, 22:46

General

  • Target

    ValoMadeByvenus.exe

  • Size

    76KB

  • MD5

    ad18b27209befbbc41ad92f06cc9457d

  • SHA1

    2326a907c614026e77551a95d6552a2e5c4e57d8

  • SHA256

    e2d0984ee4304bc13624d0260a15c465d7ecaf909452acfdd7221e72e776369a

  • SHA512

    cc82c24a841c7bda3776d7c3df2addc415b72b078837b3754642d072e64ff53365ec07d0dd2c6ca9f778f817f081dac82116bd8568c023b746a492e171a4cebd

  • SSDEEP

    1536:/rxA5fxEsD6yB/QAIuooqPP/baX3URnwB/fjCPB5weO1OFdkLlc/:zxAtxE5yVQru9c/bW3Qq/fjkB5fO1OFr

Score
10/10

Malware Config

Extracted

Family

xworm

C2

paypal-themselves.gl.at.ply.gg:34855

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    winaudiog.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ValoMadeByvenus.exe
    "C:\Users\Admin\AppData\Local\Temp\ValoMadeByvenus.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    PID:1036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1036-0-0x000007FEF5673000-0x000007FEF5674000-memory.dmp

    Filesize

    4KB

  • memory/1036-1-0x0000000000BD0000-0x0000000000BEA000-memory.dmp

    Filesize

    104KB

  • memory/1036-6-0x000007FEF5670000-0x000007FEF605C000-memory.dmp

    Filesize

    9.9MB

  • memory/1036-7-0x000007FEF5673000-0x000007FEF5674000-memory.dmp

    Filesize

    4KB

  • memory/1036-8-0x000007FEF5670000-0x000007FEF605C000-memory.dmp

    Filesize

    9.9MB