Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 22:46
Behavioral task
behavioral1
Sample
ValoMadeByvenus.exe
Resource
win7-20250207-en
7 signatures
150 seconds
General
-
Target
ValoMadeByvenus.exe
-
Size
76KB
-
MD5
ad18b27209befbbc41ad92f06cc9457d
-
SHA1
2326a907c614026e77551a95d6552a2e5c4e57d8
-
SHA256
e2d0984ee4304bc13624d0260a15c465d7ecaf909452acfdd7221e72e776369a
-
SHA512
cc82c24a841c7bda3776d7c3df2addc415b72b078837b3754642d072e64ff53365ec07d0dd2c6ca9f778f817f081dac82116bd8568c023b746a492e171a4cebd
-
SSDEEP
1536:/rxA5fxEsD6yB/QAIuooqPP/baX3URnwB/fjCPB5weO1OFdkLlc/:zxAtxE5yVQru9c/bW3Qq/fjkB5fO1OFr
Malware Config
Extracted
Family
xworm
C2
paypal-themselves.gl.at.ply.gg:34855
Attributes
-
Install_directory
%Userprofile%
-
install_file
winaudiog.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4628-1-0x0000000000140000-0x000000000015A000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winaudiog.lnk ValoMadeByvenus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winaudiog.lnk ValoMadeByvenus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4628 ValoMadeByvenus.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4628 ValoMadeByvenus.exe Token: SeDebugPrivilege 4628 ValoMadeByvenus.exe